Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy
Control Theory Tutorial
This open access brief introduces the basic principles of control theory in a concise self-study guide. It complements the classic texts by emphasizing the simple conceptual unity of the subject. A novice can quickly see how and why the different parts fit together. The concepts build slowly and naturally one after another, until the reader soon ha...
Stability and Control of Linear Systems
This advanced textbook introduces the main concepts and advances in systems and control theory, and highlights the importance of geometric ideas in the context of possible extensions to the more recent developments in nonlinear systems theory. Although inspired by engineering applications, the content is presented within a strong theoretical framew...
Reactive Power Control in AC Power Systems
This textbook explores reactive power control and voltage stability and explains how they relate to different forms of power generation and transmission. Bringing together international experts in this field, it includes chapters on electric power analysis, design and operational strategies. The book explains fundamental concepts before moving on t...
Automatic Control with Experiments
This book presents theory and practice in the context of automatic control education. It presents the relevant theory in the first eight chapters,applying them later on to the control of several real plants. Each plant is studied following a uniform procedure: a) the plant’s functionis described, b) a mathematical model is obtained, c) plant cons...
AI based Robot Safe Learning and Control
This open book mainly focuses on the safe control of robot manipulators. The control schemes are mainly developed based on dynamic neural network, which is an important theoretical branch of deep reinforcement learning. In order to enhance the safety performance of robot systems, the control strategies include adaptive tracking control for robots w...
Tobacco Control Policy in the Netherlands
Governments have known since the 1960s that smoking results in irreversible health damage. This book examines why governments have done so little to combat this when they have been aware of the problem and its solutions for decades. What are the strategies and decisions that make a difference, given that policy environments are often not conducive ...
Stochastics of Environmental and Financial Economics
These Proceedings offer a selection of peer-reviewed research and survey papers by some of the foremost international researchers in the fields of finance, energy, stochastics and risk, who present their latest findings on topical problems. The papers cover the areas of stochastic modeling in energy and financial markets; risk management with envir...
Twin-Control
This book summarizes the results of the European research project "Twin-model based virtual manufacturing for machine tool-process simulation and control" (Twin-Control). The first part reviews the applications of ICTs in machine tools and manufacturing, from a scientific and industrial point of view, and introduces the Twin-Control appro...
Robotics
This book introduces readers to robotics, industrial robot mechanisms, and types of robots, e.g. parallel robots, mobile robots and humanoid robots. The book is based on over 20 years of teaching robotics and has been extensively class tested and praised for its simplicity.It addresses the following subjects: a general introduction to robotics; bas...
Access Controlled
Internet filtering, censorship of Web content, and online surveillance are increasing in scale, scope, and sophistication around the world, in democratic countries as well as in authoritarian states. The first generation of Internet controls consisted largely of building firewalls at key Internet gateways; China's famous "Great Firewall o...
Version Control with Subversion
Written by members of the development team that maintains Subversion, this is the official guide and reference manual for the popular open source revision control technology. The new edition covers Subversion 1.7 with a complete introduction and guided tour of its capabilities, along with best practice recommendations. Version Control with Subve...
Brexit and the Control of Tobacco Illicit Trade
This open book assesses the consequences of Brexit for the control of illicit trade in tobacco products in the UK and EU. Based on the currently applicable legal framework, it examines the significance of a possible non-application of the acquis communautaire in the UK in matters relating to anti-illicit trade in tobacco legislation. It also analys...
SQL Server Source Control Basics
Few software developers would build an application without using source control, but its adoption for databases has been slower. Yet without source control to maintain the scripts necessary to create our database objects, load lookup data, and take other actions, we cannot guarantee a reliable and repeatable database deployment process, let alone c...
Safer Healthcare
The authors of this book set out a system of safety strategies and interventions for managing patient safety on a day-to-day basis and improving safety over the long term. These strategies are applicable at all levels of the healthcare system from the frontline to the regulation and governance of the system. There have been many advances in patien...
Social Theory of Fear
In the current crisis of the capitalist world system, elites promote fear of crime and terrorism to keep and expand their privileges and control the masses. This book offers an analysis of the crisis and strategies for rebellion....
A Time for Metabolism and Hormones
Recent years have seen spectacular advances in the field of circadian biology. These have attracted the interest of researchers in many fields, including endocrinology, neurosciences, cancer, and behavior. By integrating a circadian view within the fields of endocrinology and metabolism, researchers will be able to reveal many, yet-unsuspected aspe...
Cold Micro Metal Forming
This book contains the research report of the Collaborative Research Center "Micro Cold Forming" (SFB 747) of the University of Bremen, Germany. The topical research focus lies on new methods and processes for a mastered mass production of micro parts which are smaller than 1mm (by forming in batch size higher than one million). The targe...
Theory and Applications of Ordered Fuzzy Numbers
This book offers comprehensive coverage on Ordered Fuzzy Numbers, providing readers with both the basic information and the necessary expertise to use them in a variety of real-world applications. The respective chapters, written by leading researchers, discuss the main techniques and applications, together with the advantages and shortcomings of t...
Competition Authorities in South Eastern Europe
This book provides answers to key open questions concerning competition policy in emerging economies, with a focus on South Eastern Europe. The contributions address two major issues. One is the design of competition policy and the national competition authorities that enforce it, including the topics of competition advocacy and state aid control; ...
Autonomous Control for a Reliable Internet of Services
This free book was prepared as a Final Publication of the COST Action IC1304 "Autonomous Control for a Reliable Internet of Services (ACROSS)". The book contains 14 chapters and constitutes a show-case of the main outcome of the Action in line with its scientific goals. It will serve as a valuable reference for undergraduate and post-grad...
Risk Communication for the Future
The conventional approach to risk communication, based on a centralized and controlled model, has led to blatant failures in the management of recent safety related events. In parallel, several cases have proved that actors not thought of as risk governance or safety management contributors may play a positive role regarding safety. Building on the...
Intel Trusted Execution Technology for Server Platforms
Intel Trusted Execution Technology (Intel TXT) is a new security technology that started appearing on Intel server platforms in 2010. This book explains Intel Trusted Execution Technology for Servers, its purpose, application, advantages, and limitations. This book guides the server administrator / datacenter manager in enabling the technology as w...
Building the Infrastructure for Cloud Security
For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components nece...
eIoT
This book explores the collision between the sustainable energy transition and the Internet of Things (IoT). In that regard, this book's arrival is timely. Not only is the Internet of Things for energy applications, herein called the energy Internet of Things (eIoT), rapidly developing but also the transition towards sustainable energy to abat...
The Illusion of Risk Control
This book explores the implications of acknowledging uncertainty and black swans for regulation of high-hazard technologies, for stakeholder acceptability of potentially hazardous activities and for risk governance. The conventional approach to risk assessment, which combines the likelihood of an event and the severity of its consequences, is poorl...
Special Topics in Information Technology
This book presents nine outstanding doctoral dissertations in Information Technology from the Department of Electronics, Information and Bioengineering, Politecnico di Milano, Italy. Information Technology has always been highly interdisciplinary, as many aspects have to be considered in IT systems. The doctoral studies program in IT at Politecnico...
Measurement and Control of Charged Particle Beams
This advanced textbook and reference is the first comprehensive and systematic review of all methods used for the measurement, correction, and control of the beam dynamics of modern particle accelerators. Based on material presented in several lectures at the US Particle Accelerator School, the text is intended for graduate students starting resear...
Towards a Systemic Theory of Irregular Migration
This open access book provides an alternative theoretical framework of irregular migration that allows to overcome many of the contradictions and theoretical impasses displayed by the majority of approaches in current literature. The analytical framework allows moving from an interpretation biased by methodological nationalism, to a more general sy...
Flexitranstore
This open access book comprises 10 high-level papers on research and innovation within the Flexitranstore Project that were presented at the FLEXITRANSTORE special session organized as part of the 21st International Symposium on High Voltage Engineering.FLEXITRANSTORE (An Integrated Platform for Increased FLEXIbility in smart TRANSmission grids wit...
Linux Appliance Design
Modern appliances are complex machines with processors, operating systems, and application software. While there are books that will tell you how to run Linux on embedded hardware, and books on how to build a Linux application, Linux Appliance Design is the first book to demonstrate how to merge the two and create a Linux appliance. You'll see...
Raspberry Pi Camera Guide
Take pictures and shoot video with your Raspberry Pi. Connecting a High Quality Camera or Camera Module turns your favourite credit-card-sized computer into a powerful digital camera. Learn how to set up and control the camera to capture stills and video footage. Discover the numerous modes and effects available, and use the camera in a variety of ...
An Introduction to C & GUI Programming
Even if you are an absolute beginner, this book will teach you all you need to know to write simple programs in C and start creating GUIs. The first half of the book is an introduction to C, and covers the basics of writing simple command-line programs. The second half shows how to use the GTK user interface toolkit with C to create feature-rich...

1 2 3 ... 17