You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book presents the latest results on predictive control of networked systems, where communication constraints (e.g., network-induced delays and packet dropouts) and cyber attacks (e.g., deception attacks and denial-of-service attacks) are considered. For the former, it proposes several networked predictive control (NPC) methods based on input-output models and state-space models respectively. For the latter, it designs secure NPC schemes from the perspectives of information security and real-time control. Furthermore, it uses practical experiments to demonstrate the effectiveness and applicability of all the methods, bridging the gap between control theory and practical applications. The book is of interest to academic researchers, R&D engineers, and graduate students in control engineering, networked control systems and cyber-physical systems.
Inspired by the community behaviors of animals and humans, cooperative control has been intensively studied by numerous researchers in recent years. Cooperative control aims to build a network system collectively driven by a global objective function in a distributed or centralized communication network and shows great application potential in a wide domain. From the perspective of cybernetics in network system cooperation, one of the main tasks is to design the formation control scheme for multiple intelligent unmanned systems, facilitating the achievements of hazardous missions – e.g., deep space exploration, cooperative military operation, and collaborative transportation. Various chall...
This book presents the select proceedings of the 2nd International Conference on Advances in Materials and Manufacturing Technology (ICAMMT 2022). The book covers the latest trends in existing and new materials, manufacturing processes, evaluation of materials properties for the application in automotive, aerospace, marine, locomotive, automotive and energy sectors. The topics covered include advanced metal forming, bending, welding and casting techniques, recycling and re-manufacturing of materials and components, materials processing, characterization and applications, multi-physics coupling simulation, and optimization, alternate materials /material substitution, thermally-enhanced proces...
Selected, peer reviewed papers from the 2011 International Conference on Chemical Engineering and Advanced Materials, (CEAM 2011), 28-30 May, 2011
None
Selected, peer reviewed papers from the International Conference on Computers and Information Processing Technologies (ICCIPT 2014), April 23-24, 2014, Shanghai, China
This book provides the proceedings of the 5th International Conference on Cyber Security Intelligence and Analytics. The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023) is an international conference dedicated to promoting novel theoretical and applied research advances in the interdisciplinary agenda of cyber security, particularly focusing on threat intelligence and analytics and countering cybercrime. Cyber security experts, including those in data analytics, incident response and digital forensics, need to be able to rapidly detect, analyze and defend against a diverse range of cyber threats in near real-time conditions. We are organizing the CSIA 2023 at Radisson Blu Shanghai Pudong Jinqiao Hotel. It will feature a technical program of refereed papers selected by the international program committee, keynote address.
This book constitutes the proceedings of the 10th Pacific Rim Conference on Multimedia, held in Bangkok, Thailand during December 15-18, 2009. The papers presented in the volume were carefully reviewed and selected from 171 submissions. The topics covered are exploring large-scale videos:automatic content genre classification, repair, enhancement and authentication, human behavior classification and recognition, image and video coding perceptual quality improvement, image annotation, retrieval, and classification, object detection and tracking, networking technologies, audio processing, 3DTV and mulit-view video, image watermarking, multimedia document search and retrieval, intelligent multimedia security and forensics, multimedia content management, image analysis and matching, coding, advanced image processing techniques, multimedia compressioin and optimization, multimedia security rights and management.
This book presents selected papers from the 11th International Symposium on Heating, Ventilation and Air Conditioning (ISHVAC 2019), with a focus on HVAC techniques for improving indoor environment quality and the energy efficiency of heating and cooling systems. Presenting inspiration for implementing more efficient and safer HVAC systems, the book is a valuable resource for academic researchers, engineers in industry, and government regulators.
This first significant collection of essays on women in China in more than two decades captures a pivotal moment in a cross-cultural—and interdisciplinary—dialogue. For the first time, the voices of China-based scholars are heard alongside scholars positioned in the United States. The distinguished contributors to this volume are of different generations, hold citizenship in different countries, and were trained in different disciplines, but all embrace the shared project of mapping gender in China and making power-laden relationships visible. The essays take up gender issues from a variety of disciplinary perspectives. Chapters focus on learned women in the eighteenth century, the chang...