" "



:





.. 1 2 3 4 5 6 7 8 9 10 ... 348

Stability Analysis and Controller Design of Local Model Networks: Stability Analysis and Controller Design of Local Model Networks
: Christian Mayr
: Springer
: 2021
: 125
:
: pdf (true), epub
: 13,8 MB

This book treats various methods for stability analysis and controller design of local model networks (LMNs). LMNs have proved to be a powerful tool in nonlinear dynamic system identification. Their system architecture is more suitable for controller design compared to alternative approximation methods. The main advantage is that linear controller design methods can be, at least locally, applied and combined with nonlinear optimization to calibrate stable state feedback as well as PID controller. The calibration of stable state-feedback controllers is based on the closed loop stability analysis methods. Here, global LMIs (Linear Matrix Inequalities) can be derived and numerically solved. For LMN based nonlinear PID controllers deriving global LMIs is not possible. Thus, two approaches are treated in this book. The first approach works iteratively to get LMIs in each iteration step. The second approach uses a genetic algorithm to determine the PID controller parameters where for each individual the stability is checked. It allows simultaneous enhancement of (competing) optimization criteria.
: Ingvar16 , 18:03 | : 0 |
Cybersecurity and Third-Party Risk: Third Party Threat Hunting: Cybersecurity and Third-Party Risk: Third Party Threat Hunting
: Gregory C. Rasner
: Wiley
: 2021
: 480
:
: pdf, epub
: 10.1 MB

Strengthen the weakest links in your cybersecurity chain. Across the world, the networks of hundreds of different world-class organizations have been breached in a seemingly never-ending stream of attacks that targeted the trusted vendors of major brands. From Target to Equifax, Home Depot, and GM, it seems as if no company is safe from a third-party incident or breach, regardless of size. And the advanced threats are now exploiting the intersection of weaknesses in cybersecurity and third-party risk management. In Cybersecurity and Third-Party Risk, veteran cybersecurity specialist Gregory Rasner walks readers through how to lock down the vulnerabilities posed to an organization's network by third parties. You'll discover how to move beyond a simple checklist and create an active, effective, and continuous system of third-party cybersecurity risk mitigation.
: Ingvar16 , 17:03 | : 0 |
: Fiber-Optic Communication Systems, 5th Edition
: Govind P. Agrawal
: Wiley
: 2021
: PDF
: 535
: 25,4 Mb
: English

Discover the latest developments in fiber-optic communications with the newest edition of this leading textbook
In the newly revised fifth edition of Fiber-Optic Communication Systems, accomplished researcher and author, Dr. Govind P. Agrawal, delivers brand-new updates and developments in the science of fiber optics communications. The book contains substantial additions covering the topics of coherence detection, space division multiplexing, and more advanced subjects.
Youll learn about topics like fibers losses, dispersion, and nonlinearities, as well as coherent lightwave systems. The latter subject has undergone major changes due to the extensive development of digital coherent systems over the last decade. Space-division multiplexing is covered as well, including multimode and multicore fibers developed in just the last ten years. Finally, the book concludes with a chapter on brand-new developments in the field that are still at the development stage and likely to become highly relevant for practitioners and researchers in the coming years.
: vitvikvas 21-06-2021, 14:20 | : 0 |
Task Intelligence for Search and Recommendation: Task Intelligence for Search and Recommendation
: Chirag Shah, Ryen W White
: Morgan & Claypool
: 2021
: 162
:
: pdf (true)
: 10.1 MB

While great strides have been made in the field of search and recommendation, there are still challenges and opportunities to address information access issues that involve solving tasks and accomplishing goals for a wide variety of users. Specifically, we lack intelligent systems that can detect not only the request an individual is making (what), but also understand and utilize the intention (why) and strategies (how) while providing information and enabling task completion. Many scholars in the fields of information retrieval, recommender systems, productivity (especially in task management and time management), and artificial intelligence have recognized the importance of extracting and understanding people's tasks and the intentions behind performing those tasks in order to serve them better.
: Ingvar16 20-06-2021, 18:56 | : 0 |
: Visual Analysis of Multilayer Networks
: Fintan McGee
: Morgan & Claypool
: 2021
: PDF
: 152
: 10 Mb
: English

The emergence of multilayer networks as a concept from the field of complex systems provides many new opportunities for the visualization of network complexity, and has also raised many new exciting challenges. The multilayer network model recognizes that the complexity of relationships between entities in real-world systems is better embraced as several interdependent subsystems (or layers) rather than a simple graph approach. Despite only recently being formalized and defined, this model can be applied to problems in the domains of life sciences, sociology, digital humanities, and more. Within the domain of network visualization there already are many existing systems, which visualize data sets having many characteristics of multilayer networks, and many techniques, which are applicable to their visualization. In this Synthesis Lecture, we provide an overview and structured analysis of contemporary multilayer network visualization. This is not only for researchers in visualization, but also for those who aim to visualize multilayer networks in the domain of complex systems, as well as those solving problems within application domains.
: vitvikvas 20-06-2021, 18:47 | : 0 |
Telecom Extreme Transformation: The Road to a Digital Service Provider: Telecom Extreme Transformation: The Road to a Digital Service Provider
: Kaveh Hushyar, Harald Braun
: CRC Press
: 2021
: 259
:
: pdf (true)
: 10.9 MB

Telecommunication companies deliver digital bits to the customers for a fee. There are two kinds of bits: "fast and faster dumb bits" which is capital intensive with low margins, and "intelligent bits" with additional content component and with higher margin. Traditional Communication Service Providers (CSPs) have gone through transformation after transformation over the past several decades. All past transformations have had one thing in common, that is the delivery of faster dumb bits, leveraging the technology evolution from analog to digital, to wireless, to IP. The next wave of transformations will be very different, we call it extreme transformation, in that the CSPs have to become a Digital Service Provider (DSP) to stay relevant. In the DSP world, with billions of sensors and IoT devices, digital lifestyle will be enabled by data mining and analytics, leading to decision making, and entertainment.
: Ingvar16 20-06-2021, 16:11 | : 0 |
Artificial Intelligence Systems and the Internet of Things in the Digital Era
: Artificial Intelligence Systems and the Internet of Things in the Digital Era
: Editors: Abdalmuttaleb M. A. Musleh Al-Sartawi, Anjum Razzaque, Muhammad Mustafa Kamal
: Springer
: 2021
: 546
: 35.01
: PDF
: English

This book brings together intelligence systems and the Internet of Things, with special attention given to the opportunities, challenges, for education, business growth, and economic progression of nations which will help societies (economists, financial managers, engineers, ICT specialists, digital managers, data managers, policymakers, regulators, researchers, academics, and students) to better understand, use, and control AI and IoT to develop future strategies and to achieve sustainability goals.
: ak5812 20-06-2021, 00:12 | : 0 |
Internet of Energy for Smart Cities: Machine Learning Models and Techniques: Internet of Energy for Smart Cities: Machine Learning Models and Techniques
: Anish Jindal, Gagangeet Singh Aujla, Neeraj Kumar
: CRC Press
: 2022
: 323
:
: pdf (true)
: 24.4 MB

Machine learning approaches has the capability to learn and adapt to the constantly evolving demands of large Internet-of-energy (IoE) network. The focus of this book is on using the machine learning approaches to present various solutions for IoE network in smart cities to solve various research gaps such as demand response management, resource management and effective utilization of the underlying ICT network. It provides in-depth knowledge to build the technical understanding for the reader to pursue various research problems in this field. Moreover, the example problems in smart cities and their solutions using machine learning are provided as relatable to the real-life scenarios. Aimed at Graduate Students, Researchers in Computer Science, Electrical Engineering, Telecommunication Engineering, Internet of Things, Machine Learning, Green computing, Smart Grid
: Ingvar16 19-06-2021, 16:31 | : 0 |
The Cloud Computing Book: The Future of Computing Explained: The Cloud Computing Book: The Future of Computing Explained
: Douglas E. Comer
: CRC Press
: 2021
: 288
:
: pdf (true)
: 10.1 MB

This latest textbook from bestselling author, Douglas E. Comer, is a claass-tested book providing a comprehensive introduction to cloud computing. Focusing on concepts and principles, rather than commercial offerings by cloud providers and vendors, The Cloud Computing Book: The Future of Computing Explained gives readers a complete picture of the advantages and growth of cloud computing, cloud infrastructure, virtualization, automation and orchestration, and cloud-native software design.
: Ingvar16 19-06-2021, 12:41 | : 0 |
: Opportunistic Networks: Fundamentals, Applications and Emerging Trends
: Anshul Verma (Editor), Pradeepika Verma (Editor), Sanjay Kumar Dhurandher (Editor), Isaac Woungang (Editor)
: CRC Press
: 2021
: True PDF
: 330
: 24.1 Mb
: English

The opportunistic network is an emerging and recent area of research. To make this research area more adaptable for practical and industrial use, there is a need to further investigate several research challenges in all aspects of opportunistic networks. Therefore, Opportunistic Networks: Fundamentals, Applications and Emerging Trends provides theoretical, algorithmic, simulation, and implementation-based research developments related to fundamentals, applications, and emerging research trends in opportunistic networks.
: bomboane 19-06-2021, 05:37 | : 0 |

.. 1 2 3 4 5 6 7 8 9 10 ... 348




 MirKnig.Su  2020