This book addresses the hazard of gas explosions in sealed underground coal mines, and how the risk of explosion can be assessed, modeled, and mitigated. With this text, coal mine operators and managers will be able to identify the risks that lead to underground mine gas explosions, and implement practical strategies to optimize mining safety for workers. In six chapters, the book offers a framework for understanding the sealed coal mine atmosphere, the safety characteristics that are currently in place, and the guidelines to be followed by engineers to improve upon these characteristics. The first part of the book describes the importance and characteristics of underground gas mine explosions in a historical context with data showing the high number of fatalities from explosion incidents, and how risk has been mitigated in the past. Chapters also detail mathematical models and explosibility diagrams for determining and understanding the risk factors involved in mine explosions. Readers will also learn about safety operations, and assessments for the sealed mine atmosphere. With descriptions of chapter case studies, mining engineers and researchers will learn how to apply safety measures in underground coal mines to improve mining atmospheres and save lives.
This book introduces readers to the background and principles of mobile service computing. It discusses various aspects of service computing in mobile environments, including key methods and techniques for service selection, recommendation, composition, offloading, execution, deployment, and provision.
This SpringerBrief offers two concrete design examples for traffic offloading. The first is an optimal resource allocation for small-cell based traffic offloading that aims at minimizing mobile users’ data cost. The second is an optimal resource allocation for device-to-device assisted traffic offloading that also minimizes the total energy consumption and cellular link usage (while providing an overview of the challenging issues). Both examples illustrate the importance of proper resource allocation to the success of traffic offloading, show the consequent performance advantages of executing optimal resource allocation, and present the methodologies to achieve the corresponding optimal offloading solution for traffic offloading in heterogeneous cellular networks. The authors also include an overview of heterogeneous cellular networks and explain different traffic offloading paradigms ranging from uplink traffic offloading through small cells to downlink traffic offloading via mobile device-to-device cooperation. This brief is an excellent resource for postgraduate students studying advanced-level topics in wireless communications and networking. Researchers, engineers and professionals working in related fields will also find this brief a valuable resource tool.
This book focuses on security science and technology, data and information security, and mobile and network security for space-air-ground integrated networks (SAGINs). SAGIN are expected to play an increasingly important role in providing real-time, flexible, and integrated communication and data transmission services in an efficient manner. Today, SAGINs have been widely developed for a range of applications in navigation, environmental monitoring, traffic management, counter-terrorism, etc. However, security becomes a major concern, since the satellites, spacecrafts, and aircrafts are susceptible to a variety of traditional/specific network-based attacks, including eavesdropping, session hijacking, and illegal access. In this book, we review the theoretical foundations of SAGIN security. We also address a range of related security threats and provide cutting-edge solutions in the aspect of ground network security, airborne network security, space network security, and provide future trends in SAGIN security. The book goes from an introduction to the topic’s background, to a description of the basic theory, and then to cutting-edge technologies, making it suitable for readers at all levels including professional researchers and beginners. To gain the most from the book, readers should have taken prior courses in information theory, cryptography, network security, etc.
In the last decades robots are expected to be of increasing intelligence to deal with a large range of tasks. Especially, robots are supposed to be able to learn manipulation skills from humans. To this end, a number of learning algorithms and techniques have been developed and successfully implemented for various robotic tasks. Among these methods, learning from demonstrations (LfD) enables robots to effectively and efficiently acquire skills by learning from human demonstrators, such that a robot can be quickly programmed to perform a new task. This book introduces recent results on the development of advanced LfD-based learning and control approaches to improve the robot dexterous manipulation. First, there's an introduction to the simulation tools and robot platforms used in the authors' research. In order to enable a robot learning of human-like adaptive skills, the book explains how to transfer a human user’s arm variable stiffness to the robot, based on the online estimation from the muscle electromyography (EMG). Next, the motion and impedance profiles can be both modelled by dynamical movement primitives such that both of them can be planned and generalized for new tasks. Furthermore, the book introduces how to learn the correlation between signals collected from demonstration, i.e., motion trajectory, stiffness profile estimated from EMG and interaction force, using statistical models such as hidden semi-Markov model and Gaussian Mixture Regression. Several widely used human-robot interaction interfaces (such as motion capture-based teleoperation) are presented, which allow a human user to interact with a robot and transfer movements to it in both simulation and real-word environments. Finally, improved performance of robot manipulation resulted from neural network enhanced control strategies is presented. A large number of examples of simulation and experiments of daily life tasks are included in this book to facilitate better understanding of the readers.
Rapid advances have been made during the past few decades in earthquake response modification technologies for structures, most notably in base isolation and energy dissipation systems. Many practical applications of various dampers can be found worldwide and, in the United States, damper design has been included in building codes. The current desi
This book presents a bio-inspired hierarchical control scheme step by step toward developing limbless robots capable of 3D locomotion, fast reflex response, as well as sophisticated reaction to environmental stimuli. This interdisciplinary book introduces how to combine biological concept with locomotion control of limbless robots. The special features of the book include limbless locomotion classification and control, design of biological locomotor and the integration of sensory information into the locomotor using artificial intelligence methods, and on-site demonstrations of limbless locomotion in different scenarios. The book is suitable for readers with engineering background, especially for researchers focused on bio-inspired robots.
This book discusses corrosion and inhibition using agricultural waste including the impact of corrosion on key emerging technologies such as 3D printing, clean energy, smart coating, and machine learning via environment, sustainability, and governance and economies (ESG) approach. The advantages and disadvantages of using this ecofriendly, sustainable natural product as a corrosion inhibitor over other commercially available corrosion inhibitors is discussed. Features: Discusses the concept of Industry 4.0 in corrosion inhibition technology. Explains how agricultural wastes are used in solving global corrosion challenges that aim to demystify machine learning, artificial intelligence, and waste to wealth, in different industries. Reviews in-depth inhibitor application in solving global challenges of housing, transport, oil and gas, among others. Explores impact of corrosion on the environment, sustainability, and governance and economies. Examines corrosion and 3D printing focusing on history, materials, manufacturers, and trends. The book is aimed at researchers and graduate students in corrosion, materials science, and waste processing.
Mechanical Behaviors of Carbon Nanotubes: Theoretical and Numerical Approaches presents various theoretical and numerical studies on mechanical behaviors of carbon nanotubes. The main theoretical aspects included in the book contain classical molecular dynamics simulation, atomistic-continuum theory, atomic finite element method, continuum plate, nonlocal continuum plate, and shell models. Detailed coverage is also given to structural and elastic properties, trace of large deformation, buckling and post-buckling behaviors, fracture, vibration characteristics, wave propagation, and the most promising engineering applications. This book not only illustrates the theoretical and numerical methods for analyzing the mechanical behavior of carbon nanotubes, but also contains computational results from experiments that have already taken place. - Covers various theoretical and numerical studies, giving readers a greater understanding of the mechanical behavior of carbon nanotubes - Includes multiscale methods that provide the advantages of atomistic and continuum approaches, helping readers solve complex, large-system engineering problems - Allows engineers to create more efficient carbon nanotube structures and devices
Over the past decade, the transient gene expression (TGE) technology platform has been actively pursued to produce a wide range of therapeutic proteins, monoclonal antibodies, and vaccines for mainly preclinical assessment, due to its short development times and low overall cost. This book updates the latest advances in the field, with focusing on systematic description of the technology from cell lines, cell culture conditions, vector construction, expression strategy, current protocols, optimisation of the procedure, and potential for clinical application. As a conclusion, the author foresees that therapeutic biopharmaceutics will be manufactured for clinical development using TGE technology in the near future because of its fast development time, good protein expression, acceptable quality of product and due to the progress which has been made in analytical methodology and process quality control. The objectives of this book are to summarise current TGE protocols, to describe optimisation of the technology through the latest advances, and to explore clinical applications of the technology. It gives the reader a good insight into the latest development and future application of the technology platform, including: The current protocols from small to large scale for different cells. Optimisation methods in construction designing, transfection procedures, and cell culture conditions. Overall quality of the product from the transient gene expression. Future clinical application of the technology platform.
Comprehensive reference covering signal detection for random access in IoT systems from the beginner to expert level With a carefully balanced blend of theoretical elements and applications, IoT Signal Detection is an easy-to-follow presentation on signal detection for IoT in terms of device activity detection, sparse signal detection, collided signal detection, round-trip delay estimation, and backscatter signal division, building progressively from basic concepts and important background material up to an advanced understanding of the subject. Various signal detection and estimation techniques are explained, e.g., variational inference algorithm and compressive sensing reconstruction algorithm, and a number of recent research outcomes are included to provide a review of the state of the art in the field. Written by four highly qualified academics, IoT Signal Detection discusses sample topics such as: ML, ZF, and MMSE detection, Markov chain Monte Carlo-based detection, variational inference-based detection, compressive sensing-based detection Sparse signal detection for multiple access, covering Bayesian compressive sensing algorithm and structured subspace pursuit algorithm Collided signal detection for multiple access using automatic modulation classification algorithm, round-trip delay estimation for collided signals Signal detection for backscatter signals, covering central limited theorem-based detection including detection algorithms, performance analysis, and simulation results Signal design for multi-cluster coordination, covering successive interference cancellation design, device grouping and power control, and constructive interference-aided multi-cluster coordination With seamless coverage of the subject presented in a linear and easy-to-understand way, IoT Signal Detection is an ideal reference for both graduate students and practicing engineers in wireless communications.
This unique book explores the important issues in studying for active visual perception. The book’s eleven chapters draw on recent important work in robot vision over ten years, particularly in the use of new concepts. Implementation examples are provided with theoretical methods for testing in a real robot system. With these optimal sensor planning strategies, this book will give the robot vision system the adaptability needed in many practical applications.
This book discusses topics related to the topological structure and biological function of gene networks regulated by microRNAs. It focuses on analyzing the relation between topological structure and biological function, applying these theoretical results to gene networks involving microRNA, illustrating their biological mechanisms, and identifying the roles of microRNA in controlling various phenomena emerging from the networks. In addition, the book explains how to control the complex biological phenomena using mathematical tools and offers a new perspective on studying microRNA. It is a useful resource for graduate students and researchers who are working on or interested in microRNAs and gene network.
This book addresses the hazard of gas explosions in sealed underground coal mines, and how the risk of explosion can be assessed, modeled, and mitigated. With this text, coal mine operators and managers will be able to identify the risks that lead to underground mine gas explosions, and implement practical strategies to optimize mining safety for workers. In six chapters, the book offers a framework for understanding the sealed coal mine atmosphere, the safety characteristics that are currently in place, and the guidelines to be followed by engineers to improve upon these characteristics. The first part of the book describes the importance and characteristics of underground gas mine explosions in a historical context with data showing the high number of fatalities from explosion incidents, and how risk has been mitigated in the past. Chapters also detail mathematical models and explosibility diagrams for determining and understanding the risk factors involved in mine explosions. Readers will also learn about safety operations, and assessments for the sealed mine atmosphere. With descriptions of chapter case studies, mining engineers and researchers will learn how to apply safety measures in underground coal mines to improve mining atmospheres and save lives.
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.