Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Energy-Based Control of Electromechanical Systems: A Novel Passivity-Based Approach (Advances in Industrial Control)
Energy-Based Control of Electromechanical Systems: A Novel Passivity-Based Approach (Advances in Industrial Control)

This book introduces a passivity-based approach which simplifies the controller design task for AC-motors. It presents the application of this novel approach to several classes of AC motors, magnetic levitation systems, microelectromechanical systems (MEMS) and rigid robot manipulators actuated by AC motors.

The novel
...
Guerrilla Capacity Planning: A Tactical Approach to Planning for Highly Scalable Applications and Services
Guerrilla Capacity Planning: A Tactical Approach to Planning for Highly Scalable Applications and Services

In these days of shortened fiscal horizons and contracted time-to-market schedules, traditional approaches to capacity planning are often seen by management as tending to inflate their production schedules. Rather than giving up in the face of this kind of relentless pressure to get things done faster, Guerrilla Capacity Planning facilitates...

Knowledge-Based Virtual Education: User-Centred Paradigms
Knowledge-Based Virtual Education: User-Centred Paradigms
Virtual learning plays an important role in providing academicians, educators and students alike, with advanced learning experiences. At the forefront of these current technologies are knowledge-based systems that assess the environment in which such learning will occur and are adaptive by nature to the individual needs of the user (Grossman et...
Artificial Intelligence Methods and Tools for Systems Biology (Computational Biology)
Artificial Intelligence Methods and Tools for Systems Biology (Computational Biology)
This book provides simultaneously a design blueprint, user guide, research agenda, and communication platform for current and future developments in artificial intelligence (AI) approaches to systems biology. It places an emphasis on the molecular dimension of life phenomena and in one chapter on anatomical and functional modeling of the brain....
Generic Programming: Advanced Lectures (Lecture Notes in Computer Science)
Generic Programming: Advanced Lectures (Lecture Notes in Computer Science)
Generic programming attempts to make programming more efficient by making it more general. This book is devoted to a novel form of genericity in programs, based on parameterizing programs by the structure of the data they manipulate.

The book presents the following four revised and extended chapters first given as lectures at the Generic...

Realization Theory and Design of Digital Images (Lecture Notes in Control and Information Sciences)
Realization Theory and Design of Digital Images (Lecture Notes in Control and Information Sciences)
This monograph deals with the description and design of digital images. Regarding digital images as special input/output relations in our previous book with LNCIS series, the description problem of digital images is transformed into the realization problem of digital images. From the data in digital images, mathematical models will be constructed....
Genetic Programming Theory and Practice VI (Genetic and Evolutionary Computation)
Genetic Programming Theory and Practice VI (Genetic and Evolutionary Computation)
Genetic Programming Theory and Practice VI was developed from the sixth workshop at the University of Michigan’s Center for the Study of Complex Systems to facilitate the exchange of ideas and information related to the rapidly advancing field of Genetic Programming (GP). Contributions from the foremost international...
Toll-like Receptors: Roles in Infection and Neuropathology (Current Topics in Microbiology and Immunology)
Toll-like Receptors: Roles in Infection and Neuropathology (Current Topics in Microbiology and Immunology)

Mammalian Toll-like receptors (TLRs) were first identified in 1997 based on their homology with Drosophila Toll, which mediates innate immunity in the fly. In recent years, the number of studies describing TLR expression and function in the nervous system has been increasing steadily and expanding beyond their traditional roles in infectious...

Investment Banking: A Guide to Underwriting and Advisory Services
Investment Banking: A Guide to Underwriting and Advisory Services

The recent financial turmoil has raised suspects on investment banks and will certainly reshape the industry. However, the transactions traditionally managed by investment banks will still require the intervention of financial institutions, as always in the past. This book aims at providing an overview of these traditional investment banking...

The Encyclopedia of World Climatology
The Encyclopedia of World Climatology

A successor to the 1986 Encyclopedia of Climatology, this compendium provides a clear explanation of current knowledge and research directions in modern climatology. This new encyclopedia emphasizes climatological developments that have evolved over the past twenty years. It offers more than 200 informative articles prepared by 150 experts on...

Security and Privacy in Mobile Information and Communication Systems
Security and Privacy in Mobile Information and Communication Systems

MobiSec was the second ICST conference on security and privacy for mobile information and communication systems. It was held in front of the beautiful historic backdrop of Catania, the Sicilian town with marvelous views of Mt. Etna. The never fully dormant volcano provided appropriate scenery, metaphorically relating to the security threats...

Advances in Digital Forensics VII: 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA
Advances in Digital Forensics VII: 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every type of crime now...
unlimited object storage image
Result Page: 454 453 452 451 450 449 448 447 446 445 444 443 442 441 440 439 438 437 436 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy