Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 13 of 13 matches in All Departments
Networked control systems (NCS) consist of sensors, actuators and controllers the operations of which may be distributed over geographically disparate locations and co-ordinated by the exchange of information passed over a communication network. The communication network may be physically wired or not. The widespread applications of the Internet have been a major driving force for research and development of NCS. NCS have advantages in terms of cost reduction, system diagnosis and flexibility, minimizing wiring and making the addition and replacement of individual elements relatively simple; efficient data sharing makes taking globally intelligent control decisions easier with an NCS. The applications of NCS are very wide, from the large scale of factory automation and plant monitoring to the smaller but complicated networks of computers in modern cars, places and autonomous robots. Networked Control Systems presents the most recent results in stability and robustness analysis as well as new developments related to networked fuzzy and optimal control. Many of the chapters contain details of case-studies, experimental, simulation and/or other application-related work showing how the theories put forward can be implemented in real systems. The state-of-the art research reported in this volume by an international team of contributors will make Networked Control Systems an essential reference for researchers and postgraduate students in control, electrical, computer and mechanical engineering and computer science.
This book provides the latest information in intelligent vehicle control and intelligent transportation. Detailed discussions of vehicle dynamics and ground-vehicle interactions are provided for the modeling, simulation and control of vehicles. It includes an extensive review of past and current research achievements in the intelligent vehicle motion control and sensory field, and the book provides a careful assessment of future developments.
The Intelligent Systems Series comprises titles that present state-of-the-art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications. Flexible manipulators play a critical role in applications in a
diverse range of fields, such as construction automation,
environmental applications, and space engineering. Due to the
complexity of the link deformation and dynamics, the research
effort on accurate modeling and high performance control of
flexible manipulators has increased dramatically in recent years.
This book presents analysis, data and insights that will of
particular use for researchers and engineers working on the
optimization and control of robotic manipulators and automation
systems. Government and industry groups have specifically stressed the importance of innovation in robotics, manufacturing automation, and control systems for maintaining innovation and high-value-added manufacturing Discusses the latest research on the quantitative effects of size, shape, mass distribution, tip load, on the dynamics and operational performance of flexible manipulators Presents unique analyses critical to the effective modeling and optimization of manipulators: hard to find data unavailable elsewhere.
The Intelligent Systems Series comprises titles that present state of the art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications. Traditionally, Intelligence and Security Informatics (ISI) research and applications have focused on information sharing and data mining, social network analysis, infrastructure protection and emergency responses for security informatics. With the continuous advance of IT technologies and the increasing sophistication of national and international security, in recent years, new directions in ISI research and applications have emerged to address complicated problems with advanced technologies. This book provides a comprehensive and interdisciplinary account of the new advances in ISI area along three fundamental dimensions: methodological issues in security informatics; new technological developments to support security-related modeling, detection, analysis and prediction; and applications and integration in interdisciplinary socio-cultural fields.
The Intelligent Systems Series publishes reference works and handbooksin three core sub-topic areas: Intelligent Automation, Intelligent Transportation Systems, and Intelligent Computing. They include theoretical studies, design methods, and real-world implementations and applications. The series' readership is broad, but focuses on engineering, electronics, and computer science. Budget constraints and optimization in sponsored search auctions
takes into account consideration of the entire life cycle of
campaigns for researchers and developers working on search systems
and ROI maximization. The highly experienced authors compiled their
knowledge and experience to provide insight, algorithms and
development techniques for successful optimized/constrained
systems. The book presents a cutting-edge budget optimization
approach that embraces three-level budget decisions in the life
cycle of search auctions: allocation across markets at the system
level, distribution over temporal slots at the campaign level, and
real-time adjustment at the keyword level.
This book provides the latest information in intelligent vehicle control and intelligent transportation. Detailed discussions of vehicle dynamics and ground-vehicle interactions are provided for the modeling, simulation and control of vehicles. It includes an extensive review of past and current research achievements in the intelligent vehicle motion control and sensory field, and the book provides a careful assessment of future developments.
Networked control systems (NCS) confer advantages of cost reduction, system diagnosis and flexibility, minimizing wiring and simplifying the addition and replacement of individual elements; efficient data sharing makes taking globally intelligent control decisions easier with NCS. The applications of NCS range from the large scale of factory automation and plant monitoring to the smaller networks of computers in modern cars, places and autonomous robots. Networked Control Systems presents recent results in stability and robustness analysis and new developments related to networked fuzzy and optimal control. Many chapters contain case-studies, experimental, simulation or other application-related work showing how the theories put forward can be implemented. The state-of-the art research reported in this volume by an international team of contributors makes it an essential reference for researchers and postgraduate students in control, electrical, computer and mechanical engineering and computer science.
This book constitutes the refereed proceedings of the three international workshops PAISI 2008, PACCF 2008, and SOCO 2008, held as satellite events of the IEEE International Conference on Intelligence and Security Informatics, ISI 2008, in Taipei, Taiwan, in June 2008. The 55 revised full papers presented were carefully reviewed and
selected from the presentations at the workshops. The 21 papers of
the Pacific Asia Workshop on Intelligence and Security Informatics
(PAISI 2008) cover topics such as information retrieval and event
detection, internet security and cybercrime, currency and data
protection, cryptography, image and video analysis, privacy issues,
social networks, modeling and visualization, and network intrusion
detection. The Pacific Asia Workshop on Cybercrime and Computer
Forensics (PACCF 2008) furnishes 10 papers about forensic
information management, forensic technologies, and forensic
principles and tools. The 24 papers of the Workshop on Social
Computing (SOCO 2008) are organized in topical sections on social
web and social information management, social networks and
agent-based modeling, as well as social opinions, e-commerce,
security and privacy considerations.
This book constitutes the refereed proceedings of the International Workshop on Intelligence and Security Informatics, WISI 2006, held in Singapore in conjunction with the 10th Pacific-Asia Conference on Knowledge Discovery and Data Mining. The 32 papers presented together with the abstract of the keynote talk were carefully reviewed. The papers are organized in sections on Web and text mining for terrorism informatics, cybercrime analysis, network security, and crime data mining.
By incorporating the latest advancement in complex system modeling and simulation into the service system research, this book makes a valuable contribution to this field that will lead service innovation and service management toward the digital twin and metaverse. It covers important topics such as computational experiments and parallel execution of a parallel service system, the modeling of artificial service systems, semi-parallel service systems, parallel service, and digital twin/metaverse. It also provides a unified framework for realizing a parallel service system that demonstrates the capabilities or potentials of adopting digital twin and metaverse. In addition, the book contains numerous solutions to real-world problems, through which both academic readers and practitioners will gain new perspectives on service systems, and learn how to model a parallel service system or how to use the model to analyze and understand the behaviors of the system. For academic readers, it sheds light on a new research direction within the service science/engineering domain made possible by the latest technologies. For practitioners, with the help of methods such as Agent-based Modeling and Simulation, the book will enable them to enhance their skills in designing or analyzing a service system.
This book constitutes the refereed proceedings of the International Conference for Smart Health, ICSH 2013, held in Beijing, China, in August 2013. The 15 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on Information Sharing, Integrating and Extraction; Mining Clinical and Medical Data; Smart Health Applications.
This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2007, held in Chengdu, China in April 2007. Coverage includes crime analysis, emergency response and surveillance, intrusion detection, network security, data and text mining, cybercrime and information access and security, intrusion detection, network security, terrorism informatics and crime analysis.
Parallel Population and Parallel Human Proposes a new paradigm to investigate an individual’s cognitive deliberation in dynamic human-machine interactions Today, intelligent machines enable people to interact remotely with friends, family, romantic partners, colleagues, competitors, organizations, and others. Virtual reality (VR), augmented reality (AR), artificial intelligence (AI), mobile social media, and other technologies have been driving these interactions to an unprecedented level. As the complexity in system control and management with human participants increases, engineers are facing challenges that arise from the uncertainty of operators or users. Parallel Population and Parallel Human: A Cyber-Physical Social Approach presents systemic solutions for modeling, analysis, computation, and management of individuals’ cognition and decision-making in human-participated systems, such as the MetaVerse. With a virtual-real behavioral approach that seeks to actively prescribe user behavior through cognitive and dynamic learning, the authors present a parallel population/human model for optimal prescriptive control and management of complex systems that leverages recent advances in artificial intelligence. Throughout the book, the authors address basic theory and methodology for modeling, describe various implementation techniques, highlight potential acceleration technologies, discuss application cases from different fields, and more. In addition, the text: Considers how an individual’s behavior is formed and how to prescribe their behavioral modes Describes agent-based computation for complex social systems based on a synthetic population from realistic individual groups Proposes a universal algorithm applicable to a wide range of social organization types Extends traditional cognitive modeling by utilizing a dynamic approach to investigate cognitive deliberation in highly time-variant tasks Presents a new method that can be used for both large-scale social systems and real-time human-machine interactions without extensive experiments for modeling Parallel Population and Parallel Human: A Cyber-Physical Social Approach is a must-read for researchers, engineers, scientists, professionals, and graduate students who work on systems engineering, human-machine interaction, cognitive computing, and artificial intelligence.
|
You may like...
|