This book discusses what is often called the “Great Leap Famine”, which occurred in China during the years from 1959 to 1961. Scholarly consensus suggests that 30 million Chinese perished. Yang Songlin’s book provides an evidence-based, systematic and substantial rebuff, concluding that a much smaller number of deaths can be verified. This book is of interest to scholars of China and Chinese development and politics, economists, and demographers.
This book shows some secure control methods of networked control systems related to linear control system, nonlinear control system, multi-agent system and its applications in power systems. The proposed secure control methods provide some useful results about modeling of network attacks, resilient analysis and synthesis methods, active defense control method.The contents of this book are lists as followings. (1) Modeling of DoS attacks, deception attacks and replay attacks; (2)Secure control methods are proposed by combing delay system method, switched system method and event-based control method. (3) Active control methods are proposed by using model-predictive control and redundant control. (4) The proposed control methods are applied to the security problem of power system.The methods of this book include DoS attacks modeling such as, periodic jamming attack model,model-based average dwell time model, deception attack modeling and relay attack modeling; piece-wise Lyapunov-Krasoviskiifunctional method, stochastic control method; the results including resilient conditions of networked control system and related resilient control design method with linear matrix inequalities(LMIs).From this book, readers can learn about the general network attack modeling methods, resilient analysis and synthesis methods, active control methods from viewpoint of redundancy control, and secure conditions of power systems.Some fundamental knowledge prepared to read this book includes delay system theory, event triggered mechanism, T-S fuzzy system theory and frequency/voltage control of power system.
This book offers readers a series of robotic methods for manipulating zebrafish larva, one of the most popular model vertebrates widely used in biomedical research and clinical applications. The authors leverage advanced control theories, image processing algorithms, and artificial intelligence to establish a robot-assisted automated or semi-automated zebrafish larva-targeted micromanipulation system for different experimental purposes. The methods presented are generic and can be translated to manipulate other types of biological objects, such as embryos or cells. Coverage includes topics that span the procedures of manipulating zebrafish larva, such as in-plane positioning, three-dimensional orientation, deformation-controllable immobilization, organ-targeted microinjection, whole-organism imaging, and high-throughput trajectory tracking of zebrafish larvae group movement. Robotic Micromanipulation of Zebrafish Larva is written in a simple, clear, and easy-to-read style. It is an ideal reference for academic researchers and biomedical operators. It is also a valuable resource for students learning robotics, control and system theories, image processing, artificial intelligence, and biomedical engineering.
This SpringerBrief provides state-of-the-art technical reviews on self-organizing and optimization in 5G systems. It covers the latest research results from physical-layer channel modeling to software defined network (SDN) architecture. This book focuses on the cutting-edge wireless technologies such as heterogeneous networks (HetNets), self-organizing network (SON), smart low power node (LPN), 3D-MIMO, and more. It will help researchers from both the academic and industrial worlds to better understand the technical momentum of 5G key technologies.
This SpringerBrief provides state-of-the-art technical reviews on self-organizing and optimization in 5G systems. It covers the latest research results from physical-layer channel modeling to software defined network (SDN) architecture. This book focuses on the cutting-edge wireless technologies such as heterogeneous networks (HetNets), self-organizing network (SON), smart low power node (LPN), 3D-MIMO, and more. It will help researchers from both the academic and industrial worlds to better understand the technical momentum of 5G key technologies.
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.