Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 6 of 6 matches in All Departments
The area of adaptive systems, which encompasses recursive identification, adaptive control, filtering, and signal processing, has been one of the most active areas of the past decade. Since adaptive controllers are fundamentally nonlinear controllers which are applied to nominally linear, possibly stochastic and time-varying systems, their theoretical analysis is usually very difficult. Nevertheless, over the past decade much fundamental progress has been made on some key questions concerning their stability, convergence, performance, and robustness. Moreover, adaptive controllers have been successfully employed in numerous practical applications, and have even entered the marketplace.
The area of adaptive systems, which encompasses recursive identification, adaptive control, filtering, and signal processing, has been one of the most active areas of the past decade. Since adaptive controllers are fundamentally nonlinear controllers which are applied to nominally linear, possibly stochastic and time-varying systems, their theoretical analysis is usually very difficult. Nevertheless, over the past decade much fundamental progress has been made on some key questions concerning their stability, convergence, performance, and robustness. Moreover, adaptive controllers have been successfully employed in numerous practical applications, and have even entered the marketplace.
This IMA Volume in Mathematics and its Applications DISCRETE EVENT SYSTEMS, MANUFACTURING SYSTEMS AND COMMUNICATION NETWORKS is based on the proceedings of a workshop that was an integral part of the 1992-93 IMA program on "Control Theory. " The study of discrete event dynamical systems (DEDS) has become rapidly popular among researchers in systems and control, in communication networks, in manufacturing, and in distributed computing. This development has created problems for re searchers and potential "consumers" of the research. The first problem is the veritable Babel of languages, formalisms, and approaches, which makes it very difficult to determine the commonalities and distinctions among the competing schools of approaches. The second, related, problem arises from the different traditions, paradigms, values, and experience that scholars bring to their study of DEDS, depending on whether they come from control, com munication, computer science, or mathematical logic. As a result, intellectual exchange among scholars becomes compromised by unexplicated assumptions. The purpose of the Workshop was to promote exchange among scholars representing some of the major "schools" of thought in DEDS with the hope that (1) greater clarity will be achieved thereby, and (2) cross-fertilization will lead to more fruitful questions. We thank P. R. Kumar and P. P. Varaiya for organizing the workshop and editing the proceedings. We also take this opportunity to thank the National Science Foundation and the Army Research Office, whose financial support made the workshop possible. A vner Friedman Willard Miller, Jr."
Introducing the reader to the mathematics beyond complex networked systems, these lecture notes investigate graph theory, graphical models, and methods from statistical physics. Complex networked systems play a fundamental role in our society, both in everyday life and in scientific research, with applications ranging from physics and biology to economics and finance. The book is self-contained, and requires only an undergraduate mathematical background.
The current state-of-art in securing computers and data is tantamount to an arms race between the attackers on one hand and the software developers who have to provide the updates to counteract the attacks on the other. This monograph introduces a novel technique for designing secure protocols with provable security guarantees for wireless ad-hoc networks infiltrated with adversarial nodes. It does this by developing a system-theoretical approach to secure protocol design that provides provable and comprehensive security guarantees, where any features of a protocol that reduce complexity or maximize the network throughput do not come at the expense of security. The desired approach is one of security first and performance second, which is the reverse of the current approach. This novel approach uses a game-theoretic framework that addresses the deficiencies in the defense-in-depth approach to securing complex systems. A Clean Slate Approach to Secure Wireless Networking describes in detail the theory of using this approach in both closed synchronized and unsynchronized networks. It will be of interest to all researchers and designers working on securing wireless networks.
This monograph presents a possible research agenda for analytics and control of a deep decarbonized electric grid with pervasive data, interactive consumers, and power electronics interfaces. It focuses on new lines of investigation that are driven by new technological, economical, and policy factors. Conventional monitoring and control of the power grid heavily depends upon the physical principles of the underlying engineering systems. There is however increasing complexity of the physical models compounded by a lack of precise knowledge of their parameters, as well as new uncertainties arising from behavioral, economic, and environmental aspects. On the other hand there is increasing availability of sensory data in the engineering and economic operations and it becomes attractive to leverage such data to model, monitor, analyze, and potentially close control loops over data. The increasing deployment of large numbers of Phasor Measurement Units (PMUs) provides the potential for providing timely and actionable information about the transmission system. Chapter 2 examines a framework for drastically reducing the dimensionality of the high volume streaming data, while preserving its salient features for purposes such as event detection, classification and visualization, and potentially even to close the loop around the data. Driven by the deepening penetration of renewable energy resources at both transmission and distribution levels, there is an increasing need for utilizing power electronics interfaces as intelligent devices to benefit the overall grid. Chapter 3 offers a conceptual design and concrete examples of a qualitatively different power grid stabilization mechanism in the context of networked microgrids. Another major paradigm change in the operation of the grid is that demand will have to be engaged much more to balance the partially variable renewable energy supply, which in turn requires greater understanding of human behavior to economic variables such as price. Chapter 4 presents a possible formulation to model the behavior of individual consumers in future grid operations. Chapter 5 presents a proposed solution to the problem of detecting attacks on the sensor measurements in the grid, which has become a greater concern with increasing reliance on sensor data transported over communication networks, with both sensors and networks liable to malicious cyber-attacks. The goal of this monograph is to design clean, affordable, reliable, secure, and efficient electricity services. and to expand the horizon of the state of the research in the electric energy systems, at a critical time that is seeing the emergence of Grid 3.0. It is by no means complete and aims to stimulate research by next generation researchers.
|
You may like...
|