Udsalget slutter om
Udvidet returret til d. 31. januar 2025

Kybernetik og systemteori

Her finder du spændende bøger om Kybernetik og systemteori. Nedenfor er et flot udvalg af over 792 bøger om emnet. Det er også her du finder emner som Styring af og stabiliteten i systemer, entropi.
Vis mere
Filter
Filter
Sorter efterSorter Populære
  • af Tao Zhang, S. S. Ge, T. H. Lee & mfl.
    2.183,95 - 2.192,95 kr.

  • af Hans Frenk
    2.408,95 kr.

    For a long time the techniques of solving linear optimization (LP) problems improved only marginally. Fifteen years ago, however, a revolutionary discovery changed everything. A new `golden age' for optimization started, which is continuing up to the current time. What is the cause of the excitement? Techniques of linear programming formed previously an isolated body of knowledge. Then suddenly a tunnel was built linking it with a rich and promising land, part of which was already cultivated, part of which was completely unexplored. These revolutionary new techniques are now applied to solve conic linear problems. This makes it possible to model and solve large classes of essentially nonlinear optimization problems as efficiently as LP problems. This volume gives an overview of the latest developments of such `High Performance Optimization Techniques'. The first part is a thorough treatment of interior point methods for semidefinite programming problems. The second part reviews today's most exciting research topics and results in the area of convex optimization. Audience: This volume is for graduate students and researchers who are interested in modern optimization techniques.

  • af A. Cheremensky & V. N. Fomin
    1.122,95 - 1.132,95 kr.

  • af Vladimir S. Korolyuk & Anatoly Swishchuk
    1.116,95 - 1.124,95 kr.

  • af Yury A. Kutoyants
    1.115,95 - 1.123,95 kr.

  • af Frank L. Lewis, Kyriakos G. Vamvoudakis, Yan Wan & mfl.
    2.423,95 kr.

  • af Heidar A. Talebi, Farzaneh Abdollahi & Kasra Esfandiari
    1.304,95 kr.

  • af Fadi Al-Turjman & Umar Zakir Abdul Hamid
    1.993,95 kr.

  • af José Machado
    2.423,95 kr.

    This book covers a variety of topics in the field of mechanical engineering, with a special focus on methods and technologies for modeling, simulation, and design of mechanical systems. Based on a set of papers presented at the 2nd International Conference "e;Innovation in Engineering"e;, ICIE, held in Minho, Portugal, on June 28-30, 2022, it focuses on innovation in mechanical engineering, spanning from advanced materials and composites, optimization of  manufacturing and production processes, and converging issues and technologies in additive manufacturing and industry 4.0. It covers applications in the transport and automotive, and medical and education sector, among others. This book, which belongs to a three-volume set, provides engineering researchers and professionals with extensive and timely information on new technologies and developments in the field of mechanical engineering and materials.       

  • af Alexander E. Hramov, Alexey A. Koronovskii, Valeri A. Makarov, mfl.
    1.996,95 kr.

  • af Kevin Daimi & Cathryn Peoples
    742,95 kr.

  • af Dan Braha, Yaneer Bar-yam, Carlos Gershenson, mfl.
    1.213,95 kr.

  • af Abhirup Khanna, Nguyen Gia Nhu, Tanupriya Choudhury, mfl.
    1.406,95 kr.

  • af Bourama Toni & Anthony A. Ruffa
    1.406,95 kr.

  • af Kazunori Hanagaki, Junichi Tanaka & Makoto Tomoto
    663,95 kr.

  • af Alexandre I. Danilenko
    2.750,95 kr.

    This volume in the Encyclopedia of Complexity and Systems Science, Second Edition, covers recent developments in classical areas of ergodic theory, including the asymptotic properties of measurable dynamical systems, spectral theory, entropy, ergodic theorems, joinings, isomorphism theory, recurrence, nonsingular systems. It enlightens connections of ergodic theory with symbolic dynamics, topological dynamics, smooth dynamics, combinatorics, number theory, pressure and equilibrium states, fractal geometry, chaos. In addition, the new edition includes dynamical systems of probabilistic origin, ergodic aspects of Sarnak's conjecture, translation flows on translation surfaces, complexity and classification of measurable systems, operator approach to asymptotic properties, interplay with operator algebras

  • af Alberto Bosio
    1.338,95 kr.

    This book serves as a single-source reference to the latest advances in Approximate Computing (AxC), a promising technique for increasing performance or reducing the cost and power consumption of a computing system. The authors discuss the different AxC design and validation techniques, and their integration. They also describe real AxC applications, spanning from mobile to high performance computing and also safety-critical applications.  

  • af George Mastorakis, Naercio Magaia, Evangelos K. Markakis, mfl.
    694,95 kr.

  • af Panagiotis D. Christofides & Zhe Wu
    1.113,95 kr.

  • af Yi Zhang & Alexey Piunovskiy
    2.202,95 kr.

  • af Carlos F. Tejero & Marc Baus
    736,95 kr.

  • af Rajiv Jain
    333,95 kr.

    This Cybersecurity Book Covers Each And Every Topic Of The Cybersecurity. With The Help Of This Cybersecurity Book, You Can Learn Cybersecurity Very Easily, You Don't Need To Learn Cybersecurity The Hard Way. This Is One Of The Best Cybersecurity Book For Beginners To Advanced Because It Takes You From The Basic Level Of Cybersecurity To High-Level Cybersecurity. You Can Become Cybersecurity Zero To Hero In Very Less Time!!! The Concepts In This Cybersecurity Book Are Explained Very Beautifully With Examples. This Is The Only Book You Need For Expertise In Cybersecurity.

  • af Libin Jiang
    325,95 kr.

    In this book, we consider the problem of achieving the maximum throughput and utility in a class of networks with resource-sharing constraints. This is a classical problem of great importance. In the context of wireless networks, we first propose a fully distributed scheduling algorithm that achieves the maximum throughput. Inspired by CSMA (Carrier Sense Multiple Access), which is widely deployed in today's wireless networks, our algorithm is simple, asynchronous, and easy to implement. Second, using a novel maximal-entropy technique, we combine the CSMA scheduling algorithm with congestion control to approach the maximum utility. Also, we further show that CSMA scheduling is a modular MAC-layer algorithm that can work with other protocols in the transport layer and network layer. Third, for wireless networks where packet collisions are unavoidable, we establish a general analytical model and extend the above algorithms to that case. Stochastic Processing Networks (SPNs) model manufacturing, communication, and service systems. In manufacturing networks, for example, tasks require parts and resources to produce other parts. SPNs are more general than queueing networks and pose novel challenges to throughput-optimum scheduling. We proposes a "e;deficit maximum weight"e; (DMW) algorithm to achieve throughput optimality and maximize the net utility of the production in SPNs. Table of Contents: Introduction / Overview / Scheduling in Wireless Networks / Utility Maximization in Wireless Networks / Distributed CSMA Scheduling with Collisions / Stochastic Processing networks

  • af Nigel Davies
    400,95 kr.

    Fueled by falling display hardware costs and rising demand, digital signage and pervasive displays are becoming ever more ubiquitous. Such systems have traditionally been used for advertising and information dissemination, with digital signage commonplace in shopping malls, airports and public spaces. While advertising and broadcasting announcements remain important applications, developments in sensing and interaction technologies are enabling entirely new classes of display applications that tailor content to the situation and audience of the display. As a result, signage systems are beginning to transition from simple broadcast systems to rich platforms for communication and interaction. In this lecture, we provide an introduction to this emerging field for researchers and practitioners interested in creating state-of-the-art pervasive display systems. We begin by describing the history of pervasive display research, providing illustrations of key systems, from pioneering work on supporting collaboration to contemporary systems designed for personalized information delivery. We then consider what the near future might hold for display networks -- describing a series of compelling applications that are being postulated for future display networks. Creating such systems raises a wide range of challenges and requires designers to make a series of important trade-offs. We dedicate four chapters to key aspects of pervasive display design: audience engagement, display interaction, system software, and system evaluation. These chapters provide an overview of current thinking in each area. Finally, we present a series of case studies of display systems and our concluding remarks.

  • af Marc Langheinrich
    528,95 kr.

    It is easy to imagine that a future populated with an ever-increasing number of mobile and pervasive devices that record our minute goings and doings will significantly expand the amount of information that will be collected, stored, processed, and shared about us by both corporations and governments. The vast majority of this data is likely to benefit us greatly—making our lives more convenient, efficient, and safer through custom-tailored and context-aware services that anticipate what we need, where we need it, and when we need it. But beneath all this convenience, efficiency, and safety lurks the risk of losing control and awareness of what is known about us in the many different contexts of our lives. Eventually, we may find ourselves in a situation where something we said or did will be misinterpreted and held against us, even if the activities were perfectly innocuous at the time. Even more concerning, privacy implications rarely manifest as an explicit, tangible harm. Instead, most privacy harms manifest as an absence of opportunity, which may go unnoticed even though it may substantially impact our lives.In this Synthesis Lecture, we dissect and discuss the privacy implications of mobile and pervasive computing technology. For this purpose, we not only look at how mobile and pervasive computing technology affects our expectations of—and ability to enjoy—privacy, but also look at what constitutes "e;"e;privacy"e;"e; in the first place, and why we should care about maintaining it. We describe key characteristics of mobile and pervasive computing technology and how those characteristics lead to privacy implications. We discuss seven approaches that can help support end-user privacy in the design of mobile and pervasive computing technologies, and set forward six challenges that will need to be addressed by future research.The prime target audience of this lecture are researchers and practitioners working in mobile and pervasive computing who want to better understand and account for the nuanced privacy implications of the technologies they are creating. Those new to either mobile and pervasive computing or privacy may also benefit from reading this book to gain an overview and deeper understanding of this highly interdisciplinary and dynamic field.

  • af Abhinav Mehrotra
    317,95 kr.

    Notifications provide a unique mechanism for increasing the effectiveness of real-time information delivery systems. However, notifications that demand users' attention at inopportune moments are more likely to have adverse effects and might become a cause of potential disruption rather than proving beneficial to users.In order to address these challenges a variety of intelligent notification mechanisms based on monitoring and learning users' behavior have been proposed. The goal of such mechanisms is maximizing users' receptivity to the delivered information by automatically inferring the right time and the right context for sending a certain type of information. This book presents an overview of the current state of the art in the area of intelligent notification mechanisms that rely on the awareness of users' context and preferences. We first present a survey of studies focusing on understanding and modeling users' interruptibility and receptivity to notifications from desktops and mobile devices. Then, we discuss the existing challenges and opportunities in developing mechanisms for intelligent notification systems in a variety of application scenarios.

  • af Sumi Helal
    320,95 kr.

    This lecture presents a first compendium of established and emerging standards in pervasive computing systems. The lecture explains the role of each of the covered standards and explains the relationship and interplay among them. Hopefully, the lecture will help piece together the various standards into a sensible and clear landscape. The lecture is a digest, reorganization, and a compilation of several short articles that have been published in the ¿Standards and Emerging Technologies¿ department of the IEEE Pervasive Computing magazine. The articles have been edited and shortened or expanded to provide the necessary focus and uniform coverage depth. There are more standards and common practices in pervasive systems than the lecture could cover. However, systems perspective and programmability of pervasive spaces, which are the main foci of the lecture, set the scope and determined which standards should be included. The lecture explains what it means to program a pervasive space andintroduces the new requirements brought about by pervasive computing. Among the standards the lecture covers are sensors and device standards, service-oriented device standards, service discovery and delivery standards, service gateway standards, and standards for universal interactions with pervasive spaces. In addition, the emerging sensor platform and domestic robots technologies are covered and their essential new roles explained. The lecture also briefly covers a set of standards that represents an ecosystem for the emerging pervasive healthcare industry. Audiences who may benefit from this lecture include (1) academic and industrial researchers working on sensor-based, pervasive, or ubiquitous computing R&D; (2) system integrator consultants and firms, especially those concerned with integrating sensors, actuators, and devices to their enterprise and business systems; (3) device, smart chips, and sensor manufacturers; (4) government agencies; (5) the healthcare IT and pervasive health industries; and (6) other industries such as logistics, manufacturing, and the emerging smart grid and environment sustainability industries. Table of Contents: Preface / Acknowledgments / Introduction / Sensor and Device Standards / Service-Oriented Device Architecture (SODA) / Sensor Platforms / Service Discovery and Delivery Standards / The Open Services Gateway Initiative (OSGi ) / Universal Interactions / Domestic Robots for Smart Space Interactions / Continua: An Interoperable Personal Health Echosystem / References / Author Biography

  • af Konstantinos Poularakis
    619,95 kr.

    This book provides a quick reference and insights into modeling and optimization of software-defined networks (SDNs). It covers various algorithms and approaches that have been developed for optimizations related to the control plane, the considerable research related to data plane optimization, and topics that have significant potential for research and advances to the state-of-the-art in SDN. Over the past ten years, network programmability has transitioned from research concepts to more mainstream technology through the advent of technologies amenable to programmability such as service chaining, virtual network functions, and programmability of the data plane. However, the rapid development in SDN technologies has been the key driver behind its evolution. The logically centralized abstraction of network states enabled by SDN facilitates programmability and use of sophisticated optimization and control algorithms for enhancing network performance, policy management, and security.Furthermore, the centralized aggregation of network telemetry facilitates use of data-driven machine learning-based methods. To fully unleash the power of this new SDN paradigm, though, various architectural design, deployment, and operations questions need to be addressed. Associated with these are various modeling, resource allocation, and optimization opportunities.The book covers these opportunities and associated challenges, which represent a ``call to arms'' for the SDN community to develop new modeling and optimization methods that will complement or improve on the current norms.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.