Join thousands of book lovers
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.You can, at any time, unsubscribe from our newsletters.
Conventional drone technology is enhanced with the Internet and other emerging technologies such as cloud computing, big data, artificial intelligence and communication networks which open up for enormous opportunities like ahead for on-demand service-oriented and user-friendly IoD applications.
This book presents the emerging developments in intelligent computing, machine learning, and data mining. It provides the latest cloud computing improvements and advanced computing and addresses data security and privacy to secure COVID-19 data.
This book aims through 11 chapters discussing the problems and challenges and some future research points from the recent technologies point of view such as artificial intelligence and the Internet of things (IoT) that can help the environment and healthcare sectors reducing COVID-19.
This book focuses on software reuse and the chances, dependability tests and recommendations for best reuse practice. A short introduction of the Ecodesign of hardware is given combined with the latest update of relevant EU legislation and standardization. It also describes the combination of different states of software in a E&E system in order to guarantee dependability of the product to be resold.
This book provides practical knowledge on different aspects of information and knowledge management in businesses. Thus, the second volume of this series subline continues to explore different aspects of information and knowledge handling as well as doing business with information.
This book presents few novel Discrete-time Sliding Mode (DSM) protocols for leader-following consensus of Discrete Multi-Agent Systems (DMASs).
This book uses mathematics of uncertainty to examine how well countries are achieving the 17 Sustainable Development Goals (SDGs) set by the members of the United Nations, with a focus on climate change, human trafficking and modern slavery.
Considered population dynamics models are still in the interest of researchers, and even this interest is increasing, especially now in the time of SARS-CoV-2 coronavirus pandemic, when models are intensively studied in order to help predict its behaviour within human population.
Communication-Protocol-Based Filtering and Control of Networked Systems is a self-contained treatment of the state of the art in communication-protocol-based filtering and control; recent advances in networked systems; and the potential for application in sensor networks. This book provides new concepts, new models and new methodologies with practical significance in control engineering and signal processing. The book first establishes signal-transmission models subject to different communication protocols and then develops new filter design techniques based on those models and preset requirements for filtering performance. The authors then extend this work to finite-horizon H-infinity control, ultimately bounded control and finite-horizon consensus control. The focus throughout is on three typical communications protocols: the round-robin, random-access and try-once-and-discard protocols, and the systems studied are drawn from a variety of classes, among them nonlinear systems, time-delayed and time-varying systems, multi-agent systems and complex networks.Readers are shown the latest techniques-recursive linear matrix inequalities, backward recursive difference equations, stochastic analysis and mapping methods. The unified framework for communication-protocol-based filtering and control for different networked systems established in the book will be of interest to academic researchers and practicing engineers working with communications and other signal-processing systems. Senior undergraduate and graduate students looking to increase their knowledge of current methods in control and signal processing of networked systems will also find this book valuable.
Moreover, because adaptive networks are described in a network format as well, the approach can simply be applied iteratively, so that higher-order adaptive networks in which network adaptation itself is adaptive (second-order adaptation), too can be modeled just as easily.
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.