As the end of the world arrives in downtown Shanghai, one man’s only wish is to return a library book... When a publisher agrees to let a star author use his company’s attic to write in, little does he suspect this will become the author’s permanent residence... As Shanghai succumbs to a seemingly apocalyptic deluge, a man takes refuge in his bathtub, only to find himself, moments later, floating through the city's streets... The characters in this literary exploration of one of the world’s biggest cities are all on a mission. Whether it is responding to events around them, or following some impulse of their own, they are defined by their determination – a refusal to lose themselves in a city that might otherwise leave them anonymous, disconnected, alone. From the neglected mother whose side-hustle in collecting sellable waste becomes an obsession, to the schoolboy determined to end a long-standing feud between his family and another, these characters show a defiance that reminds us why Shanghai – despite its hurtling economic growth –remains an epicentre for individual creativity.
This is the first collection of translations of Chinese film theory to be published in English. By using translations rather than summaries, as other works have done, Chinese Film Theory provides readers with an introduction to the issues current in China's film circles. It includes eighteen chapters written by a broad range of writers--from well established scholars to young people at the beginning of their involvement in film in China. This collection indicates a trend away from the study of external qualities of film and toward a study of the film itself. The volume has been carefully organized so that major issues are interrelated; thus, the book comprises an ongoing debate of film theory issues, progressing from earlier to most recent issues, following the debate concerning the relationship of film to literary arts, and looking at the debate over the relationship of film to culture. The book concludes that for the time being, debate has virtually ended because of the political situation in China. This book is an important new source to anyone interested in film studies, film theory, or Chinese studies.
This report is a partial result of the China’s Quarterly Macroeconomic Model (CQMM), a project developed and maintained by the Center for Macroeconomic Research (CMR) at Xiamen University. The CMR, one of the Key Research Institutes of Humanities and Social Sciences sponsored by the Ministry of Education of China, has been focusing on China’s economic forecast and macroeconomic policy analysis, and it started to develop the CQMM for purpose of short-term forecasting, policy analysis, and simulation in 2005.Based on the CQMM, the CMR and its partners hold press conferences to release forecasts for China’ major macroeconomic variables. Since July, 2006, twenty-six quarterly reports on China’s macroeconomic outlook have been presented and thirteen annual reports have been published. This 27th quarterly report has been presented at the Forum on China’s Macroeconomic Prospects and Press Conference of the CQMM at Xiamen University Malaysia on October 25, 2019. This conference was jointly held by Xiamen University and Economic Information Daily of Xinhua News Agency.
This book focuses on the finite-time control of attitude stabilization, attitude tracking for individual spacecraft, and finite-time control of attitude synchronization. It discusses formation reconfiguration for multiple spacecraft in complex networks, and provides a new fast nonsingular terminal sliding mode surface (FNTSMS). Further, it presents newly designed controllers and several control laws to enhance the performance of spacecraft systems and meet related demands, such as strong disturbance rejection and high-precision control. As such, the book establishes a fundamental framework for these topics, while also highlighting the importance of integrated analysis. It is a useful resource for all researchers and students who are interested in this field, as well as engineers whose work involves designing flight vehicles.
During the years spanning the late Qing dynasty and the early Republican era, the status of Chinese women changed in both subtle and decisive ways. As domestic seclusion ceased to be a sign of virtue, new opportunities emerged for a variety of women. Much scholarly attention has been given to the rise of the modern, independent “new women” during this period. However, far less is known about the stories of married nonprofessional women without modern educations and their public activities. In At Home in the World, Xia Shi unearths the history of how these women moved out of their sequestered domestic life; engaged in charitable, philanthropic, and religious activities; and repositioned themselves as effective public actors in urban Chinese society. Investigating the lives of individual women as well as organizations such as the YWCA and the Daoyuan, she shows how her protagonists built on the past rather than repudiating it, drawing on broader networks of family, marriage, and friendship and reconfiguring existing beliefs into essential components of modern Chinese gender roles. The book stresses the collective forms of agency these women exercised in their endeavors, highlighting the significance of charitable and philanthropic work as political, social, and civic engagement. Shi also analyzes how men—alive, dead, or absent—both empowered and constrained women’s public ventures. She offers a new perspective on how the public, private, and domestic realms were being remade and rethought in early twentieth-century China, in particular, how the women navigated these developing spheres. At Home in the World sheds new light on how women exerted their influence beyond the home and expands the field of Chinese women’s history.
This book provides a balanced assessment of China’s communist rule, its viability as well as its prospect of democracy. The People's Congresses and Governance in China presents a complex but convincing analysis of the transformation of governance in China. As the first systemic and theoretical study of China’s provincial legislatures, it draws our attention to one of the most promising growth points in China’s changing constitutional order. Through in depth and first hand research, the author provides a comprehensive explanation about why the provincial legislatures have acquired institutional maturation and expanded power in the context of Chinese transitional political economy. The book portrays an innovative pattern of legislative development, sums up pragmatic local strategies for market creation, and identifies multiple dynamics for promoting accountability and democracy. Based upon the case study of provincial legislatures, Ming Xia reveals the formation of a new mode of governance in China’s national politics: the network structure featuring institutional arrangements and the mohe (co-operation through competition) pattern of interaction abided by the major power players. This volume will be of interest to parliamentary scholars and parliamentarians who are concerned with the role of parliaments in transitional politics and economies of both post-communist and developing countries. It will also appeal to students and researchers of Chinese politics, governance and Asian studies.
Despite great advances in diagnosis and treatment that we witnessed in the last decades, over a billion people suffer from both respiratory and neurological diseases each year, which poses great threats to the public health and economic burden worldwide. In many instances, the underlying pathogenic mechanisms are still poorly understood, which significantly limits the efficacy of therapeutic methods. In this regard, lines of evidence pinpoint the important role of immunity and inflammation in both respiratory disorders (e.g., pulmonary hypertension, chronic obstructive pulmonary disease, asthma, etc.) and neurological ones (e.g., neurodegenerative diseases, stroke, depression, etc.). The accumulation of inflammatory cells and an excess of cytokines and chemokines at the inflammatory site would result from the disturbance of the body's delicate balance between immunity and tolerance. Therefore, it gives rise to chronic inflammation and autoimmunity underlying the development of both lung and neurological diseases. Furthermore, the inflammation interaction between lung and brain has been identified, suggesting the existence and importance of the lung-brain axis in the regulation of immune responses in the lung and brain that contribute to the onset and progression of both respiratory and neurological diseases. Nevertheless, inflammatory or immunity related risk factors as well novel targets and therapies against inflammation or immunity help early diagnosis and treatment of respiratory and neurological diseases. At present, the full picture of the molecular mechanisms of how immuno-inflammatory activation and the immune cells orchestrate the tissue remodeling leading to respiratory and neurological diseases remains unclear. The identification of inflammatory molecules as therapeutic targets or biomarkers are worth further scrutiny to halt the disease progression and monitor the therapeutic interventions.
Analysis and Synthesis of Networked Control Systems focuses on essential aspects of this field, including quantization over networks, data fusion over networks, predictive control over networks and fault detection over networks. The networked control systems have led to a complete new range of real-world applications. In recent years, the techniques of Internet of Things are developed rapidly, the research of networked control systems plays a key role in Internet of Things. The book is self-contained, providing sufficient mathematical foundations for understanding the contents of each chapter. It will be of significant interest to scientists and engineers engaged in the field of Networked Control Systems. Dr. Yuanqing Xia, a professor at Beijing Institute of Technology, has been working on control theory and its applications for over ten years.
This chapter provides a global network service provider’s view on the technology development and product commercialization of 100-Gb/s for optical transport networks. Optical channel capacity has been growing over the past four decades to address traffic demand growth and will continue this trend for the foreseeable future to meet the ever-increasing bandwidth requirements. In this chapter, optical channels are re-classified into three basic design types. Commercial 100-Gb/s channel development experienced all three types of channel designs before eventually settling on the single carrier PM-QPSK format with coherent detection, which appears to be the optimal design in the industry. A series of 100-Gb/s channel related field trials were performed in service providers’ networks to validate the technical merits as well as business advantages of this new capacity standard before its deployment. Introduction of the 100-Gb/s channel brings new opportunities to boost fiber capacity, accommodate increases in client interface speed rates, lower transmission latency, simplify network management, and speed up the realization of next generation optical add/drop functions.
This title was first published in 2000: The developmental state model, which originated in Japan, has ascended to the status of the leading paradigm for the East Asian political economy. This text explores the proposition of many specialists, that China has emulated the model and become part of the flying geese pattern of development.
500 years later, the human technology has already developed the Milky Way to its most perfect state, and in this beautiful and spacious galaxy, there is a beautiful blue-water planet with its own beautiful halo. In the outer layer of this beautiful planet, a huge ZHN-7 spaceship is already prepared to depart.
Throughout the War of Resistance against Japan (1931–1945), the Chinese Nationalist government punished collaborators with harsh measures, labeling the enemies from within hanjian (literally, “traitors to the Han Chinese”). Trials of hanjian gained momentum during the postwar years, escalating the power struggle between Nationalists and Communists. Yun Xia examines the leaders of collaborationist regimes, who were perceived as threats to national security and public order, and other subgroups of hanjian—including economic, cultural, female, and Taiwanese hanjian. Built on previously unexamined code, edicts, and government correspondence, as well as accusation letters, petitions, newspapers, and popular literature, Down with Traitors reveals how the hanjian were punished in both legal and extralegal ways and how the anti-hanjian campaigns captured the national crisis, political struggle, roaring nationalism, and social tension of China’s eventful decades from the 1930s through the 1950s.
Normalization in Translation: Corpus-based Diachronic Research into Twentieth-century English–Chinese Fictional Translation provides a comprehensive description of translation norms in two different historical contexts in twentieth-century China. Drawing on a corpus methodology, this book adopts a socio-historical approach to translation studies from a diachronic perspective, comparing translated and non-translated fictional texts from two historical periods to systematically explore the variation of normalization across time, and to highlight the social significance of translation activities by contextualizing the research results. The book includes detailed discussions of diachronic corpus construction, linguistic manifestations of normalization, changes in translation norms, and socio-cultural constraints for these changes. It expands the scope of previous studies and shows how translation studies can benefit from the use of a corpus methodology by providing an explanation, not simply a description, of how changes in translation behavior have come about. This book will be of interest to students on courses in translation and intercultural studies, as well as researchers interested in the areas of translation studies, corpus linguistics and contrastive studies of English and Chinese.
This book focuses on the basic theory and methods of multisensor data fusion state estimation and its application. It consists of four parts with 12 chapters. In Part I, the basic framework and methods of multisensor optimal estimation and the basic concepts of Kalman filtering are briefly and systematically introduced. In Part II, the data fusion state estimation algorithms under networked environment are introduced. Part III consists of three chapters, in which the fusion estimation algorithms under event-triggered mechanisms are introduced. Part IV consists of two chapters, in which fusion estimation for systems with non-Gaussian but heavy-tailed noises are introduced. The book is primarily intended for researchers and engineers in the field of data fusion and state estimation. It also benefits for both graduate and undergraduate students who are interested in target tracking, navigation, networked control, etc.
The insertion of communication networks in feedback control loops complicates analysis and synthesis of cyber-physical systems (CPSs), and network-induced uncertainties may degrade system control performance. Thus, this book researches networked delay compensation and event-triggered control approaches for a series of CPSs subject to network-induced uncertainties. The authors begin with an introduction to the concepts and challenges of CPSs, followed by an overview of networked control approaches and event-triggered control strategies in CPSs. Then, networked delay compensation and event-triggered control approaches are proposed for CPSs with network communication delay, data dropout, signal quantization, and event-triggered communication. More specifically, networked delay compensation approaches are proposed for linear/nonlinear networked controlled plants with time-varying and random network communication delays and data dropouts. To reduce computational burden and network communication loads in CPSs, event-triggered control, self-triggered control, co-design of event-triggered control and quantized control techniques, and event-triggered disturbance rejection control approaches are also presented. This book is an essential text for researchers and engineers interested in cybersecurity, networked control, and CPSs. It would also prove useful for graduate students in the fields of science, engineering, and computer science.
This book investigates the most advanced theories and methodologies of array beamforming, with a focus on antenna array enabled wireless communication technology. Combining with the current development needs and trends of wireless communication technology around the world, the authors explore the potentials and challenges of large-scale antenna array beamforming technology in next-generation mobile communication and some important emerging application scenarios. The book first introduces the basic structure of antenna array hierarchical codebook and channel estimation with high dimensionality, with which the time cost of searching the channel information can be effectively reduced. It then explicates high-efficiency beamforming transmission methods for point-to-point transmission, full-duplex point-to-point transmission, and point-to-multipoint transmission where array beamforming enabled non-orthogonal multiple access (NOMA) technologies for typical two-user systems and general multi-user systems are emphasized. The book also discusses array beamforming enabled unmanned aerial vehicle (UAV) communications and array beamforming enabled space/air/ground communications, with the uniqueness and relative solutions for single UAV systems and multi-UAV networks being analyzed. This will be a vital reference for researchers, students, and professionals interested in wireless communications, array beamforming, and millimeter-wave communications.
Based on Chinese archival documents, interviews, and more than twenty years of research on the subject, Zhihua Shen and Yafeng Xia offer a comprehensive look at the Sino-Soviet alliance between the end of the World War II and 1959, when the alliance was left in disarray as a result of foreign and domestic policies. This book is a reevaluation of the history of this alliance and is the first book published in English to examine it from a Chinese perspective.
Today, the People’s Republic of China is North Korea’s only ally on the world stage, a tightly knit relationship that goes back decades. Both countries portray their partnership as one of “brotherly affection” based on shared political ideals—an alliance “as tight as lips to teeth”—even though relations have deteriorated in recent years due to China’s ascendance and North Korea’s intransigence. In A Misunderstood Friendship, leading diplomatic historians Zhihua Shen and Yafeng Xia draw on previously untapped primary source materials revealing tensions and rivalries to offer a unique account of the China–North Korea relationship. They unravel the twists and turns in high-level diplomacy between China and North Korea from the late 1940s to the death of Mao Zedong in 1976. Through unprecedented access to Chinese government documents, Soviet and Eastern European archives, and in-depth interviews with former Chinese diplomats and North Korean defectors, Shen and Xia reveal that the tensions that currently plague the alliance between the two countries have been present from the very beginning of the relationship. They significantly revise existing narratives of the Korean War, China’s postwar aid to North Korea, Kim Il-sung’s ideological and strategic thinking, North Korea’s relations with the Soviet Union, and the importance of the Sino-U.S. rapprochement, among other issues. A Misunderstood Friendship adds new depth to our understanding of one of the most secretive and significant relationships of the Cold War, with increasing relevance to international affairs today.
He was cheated by his husband and sold to the mountains and forests. Du almost felt desperate. Fortunately, Lu Juyan saved him. With the help of Lu Juyan, Du Yanqing made great efforts to start his own business and struggled with his ex husband, finally regaining what belonged to him. And she found that Lu Juyan, the assistant teacher who saved her, was also the mysterious president of Jiashi group. As a competitor, Du Yanqing almost lost Lu Juyan, but it is still him, standing up at the critical moment of Du Yanqing. "Du Yanqing, marry me.
Chinese internal medicine is a clinical subject which explains, using traditional Chinese theories, the etiology, pathology and therapeutic rules of the diseases or syndromes belonging to internal medicine. It is also the foundation for learning and research in other clinical branches of Chinese medicine, thus playing a vital role in traditional Chinese medicine (TCM).Chinese internal medicine has had a long history. Its origins can be traced back several thousand years. Through long-term diagnostic and therapeutic practices, a rich collection of experiences and theories in Chinese internal medicine has been accumulated and this has gradually evolved into a complete, distinctive and effective clinical branch. In recent decades, Chinese internal medicine has also undergone more significant developments, especially in the treatment of cardiac or cerebral vascular diseases, digestive tract diseases, renal diseases and autoimmune diseases.In order to popularize Chinese internal medicine and allow readers to grasp its basic theories as well as diagnostic and therapeutic methods, we wrote this book in a language easily comprehensible by the layman. For ease of learning by modern doctors, we proceeded from the current clinical practice and outlined the contents with Western disease names. There are more than 80 diseases discussed in this book. For each disease, the Chinese syndrome differentiation and treatment as well as modern diagnostic key points are provided, to make it more convenient for the readers to study and understand.The study of each disease should begin from its etiology, pathology and diagnostic key points, followed by the differentiated patterns and corresponding treatments. The respective points of caution for each disease should also be well-noted. Finally, the questions forming the “Daily Exercises” are useful for readers to check their comprehension and recall of the material. Given the chance, the theoretical knowledge should also be applied in clinical practice so that past knowledge is tested and new clinical knowledge and skills can be learned.This book is suitable for those who are enthusiastic about TCM and with basic medical knowledge, as well as clinical TCM doctors, nursing personnel and TCM students.
Advanced Distributed Consensus for Multiagent Systems contributes to the further development of advanced distributed consensus methods for different classes of multiagent methods. The book expands the field of coordinated multiagent dynamic systems, including discussions on swarms, multi-vehicle and swarm robotics. In addition, it addresses advanced distributed methods for the important topic of multiagent systems, with a goal of providing a high-level treatment of consensus to different versions while preserving systematic analysis of the material and providing an accounting to math development in a unified way. This book is suitable for graduate courses in electrical, mechanical and computer science departments. Consensus control in multiagent systems is becoming increasingly popular among researchers due to its applicability in analyzing and designing coordination behaviors among agents in multiagent frameworks. Multiagent systems have been a fascinating subject amongst researchers as their practical applications span multiple fields ranging from robotics, control theory, systems biology, evolutionary biology, power systems, social and political systems to mention a few. Gathers together the theoretical preliminaries and fundamental issues related to multiagent systems and controls Provides coherent results on adopting a multiagent framework for critically examining problems in smart microgrid systems Presents advanced analysis of multiagent systems under cyberphysical attacks and develops resilient control strategies to guarantee safe operation
This 26th volume of the Evidence-based Clinical Chinese Medicine series provides a multi-faceted 'whole evidence' analysis of the management of rheumatoid arthritis (RA) using integrative Chinese medicine. Beginning with an overview of how RA is conceptualised and managed in conventional medicine (Chapter 1), the authors summarise the syndrome differentiation and management of RA in contemporary Chinese medicine (Chapter 2), based on clinical guidelines and contemporary books. Chapter 3 provides detailed analyses of how RA and related conditions were treated with herbal medicine and acupuncture in past eras based on the classical Chinese medical literature. The subsequent chapters comprehensively review the current state of the clinical evidence for the integrative application of Chinese herbal medicines (Chapter 5), acupuncture therapies (Chapter 7), other Chinese medicine therapies (Chapter 8) and combination Chinese medicine therapies (Chapter 9), as well as analyse and evaluate the results of these clinical studies from an evidence-based medicine perspective. Chapter 6 reviews and summarises experimental evidence for the bioactivity of commonly used Chinese herbs and their constituent compounds. The outcomes of these analyses are summarised and discussed in Chapter 10. Implications for clinical practice and future research are identified. This book informs clinicians and students in the fields of integrative medicine and Chinese medicine regarding contemporary practice and the current evidence base for Chinese medicine therapies for managing RA. It enables clinicians in making evidence-based decisions in patient care. It also provides researchers with a comprehensive survey of the state of the field that can inform future directions for clinical and experimental studies.
In the twenty-first century, students of Cold War history are fortunate to have the fruits of several major works on the Sino-Soviet split by European and American scholars. What is lacking in English literature, however, is a book based on international documentation, especially Chinese archival documents that tell the story from the Chinese perspective. Based on archival materials from several countries—particularly China—and more than twenty years of research on the subject, two prominent Chinese historians, Danhui Li and Yafeng Xia, offer a comprehensive look at the Sino–Soviet split from 1959, when visible cracks appeared in the Sino-Soviet alliance, to 1973, when China’s foreign policy changed from an “alliance with the Soviet Union to oppose the United States” to “aligning with the United States to oppose the Soviet Union.” Mao and the Sino-Soviet Split, 1959–1973: A New History is a reevaluation of the history of the Sino-Soviet split and offers the first comprehensive account of it from a Chinese perspective. This book, together with its prequel Mao and the Sino–Soviet Partnership, 1945–1959: A New History, is important because any changes in Sino-Soviet relations at the time affected, and to a great extent determined, the fate of the socialist bloc. More importantly, it directly impacted and transformed the international political situation during the Cold War. These two books promise to be a reevaluation of the history of the Sino-Soviet alliance from its birth to its demise. These fascinating books will be a crucial resource for all those interested in the topic and will stand as the definitive work on the Sino-Soviet alliance for years to come.
“Compound Control Methodology for Flight Vehicles” focuses on new control methods for flight vehicles. In this monograph, the concept of compound control is introduced. It is demonstrated that both Sliding Mode Control (SMC) and Active Disturbance Rejection Control (ADRC) have their own advantages and limitations, i.e., chattering of SMC and the observability of extended state observer (ESO), respectively. It is shown that compound control combines their advantages and improves the performance of the closed-loop systems. The book is self-contained, providing sufficient mathematical foundations for understanding the contents of each chapter. It will be of significant interest to scientists and engineers engaged in the field of flight vehicle control.
This open access book introduces how to manage important tasks in industrial wireless networks. Important tasks must be completed on time and with guaranteed quality; that is the consensus reached by system designers and users. However, for too long, important tasks have often been given unnecessary urgency, and people intuitively believe that important tasks should be executed first so that their performance can be guaranteed. Actually, in most cases, their performance can be guaranteed even if they are executed later, and the “early” resources can be utilized for other, more urgent tasks. Therefore, confusing importance with urgency hinders the proper use of system resources. In 2007, mixed criticality was proposed to indicate that a system may contain tasks of various importance levels. Since then, system designers and users have distinguished between importance and urgency. In the industrial field, due to the harsh environment they operate in, industrial wireless networks’ quality of service (QoS) has always been a bottleneck restricting their applications. Therefore, this book introduces criticality to label important data, which is then allocated more transmission resources, ensuring that important data’s QoS requirements can be met to the extent possible. To help readers understand how to apply mixed-criticality data to industrial wireless networks, the content is divided into three parts. First, we introduce how to integrate the model of mixed-criticality data into industrial wireless networks. Second, we explain how to analyze the schedulability of mixed-criticality data under existing scheduling algorithms. Third, we present a range of novel scheduling algorithms for mixed-criticality data. If you want to improve the QoS of industrial wireless networks, this book is for you.
Time-delay occurs in many dynamical systems such as biological systems, chemical systems, metallurgical processing systems, nuclear reactor, long transmission lines in pneumatic, hydraulic systems and electrical networks. Especially, in recent years, time-delay which exists in networked control s- temshasbroughtmorecomplexproblemintoanewresearcharea.Frequently, itisasourceofthegenerationofoscillation,instabilityandpoorperformance. Considerable e?ort has been applied to di?erent aspects of linear time-delay systems during recent years. Because the introduction of the delay factor renders the system analysis more complicated, in addition to the di?culties caused by the perturbation or uncertainties, in the control of time-delay s- tems, the problems of robust stability and robust stabilization are of great importance. This book presents some basic theories of stability and stabilization of systems with time-delay, which are related to the main results in this book. More attention will be paid on synthesis of systems with time-delay. That is, sliding mode control of systems with time-delay; networked control systems with time-delay; networked data fusion with random delay.
This book provides a comprehensive introduction to computational epidemiology, highlighting its major methodological paradigms throughout the development of the field while emphasizing the needs for a new paradigm shift in order to most effectively address the increasingly complex real-world challenges in disease control and prevention. Specifically, the book presents the basic concepts, related computational models, and tools that are useful for characterizing disease transmission dynamics with respect to a heterogeneous host population. In addition, it shows how to develop and apply computational methods to tackle the challenges involved in population-level intervention, such as prioritized vaccine allocation. A unique feature of this book is that its examination on the issues of vaccination decision-making is not confined only to the question of how to develop strategic policies on prioritized interventions, as it further approaches the issues from the perspective of individuals, offering a well integrated cost-benefit and social-influence account for voluntary vaccination decisions. One of the most important contributions of this book lies in it offers a blueprint on a novel methodological paradigm in epidemiology, namely, systems epidemiology, with detailed systems modeling principles, as well as practical steps and real-world examples, which can readily be applied in addressing future systems epidemiological challenges. The book is intended to serve as a reference book for researchers and practitioners in the fields of computer science and epidemiology. Together with the provided references on the key concepts, methods, and examples being introduced, the book can also readily be adopted as an introductory text for undergraduate and graduate courses in computational epidemiology as well as systems epidemiology, and as training materials for practitioners and field workers.
This vital work for researchers and graduate students focuses on resilience estimation and control of cyber-physical networked systems using attacker-defender game theory. It presents attack and defense strategies and describes the design and resilience of control systems to withstand cyberattacks. Complex control systems, including cyber-physical and cloud control systems, are in open network environments and are often confronted with threats from cyberspace, physical space and even cloud service. With diversified and intelligent attack patterns and improvements in attack capabilities, non-contact damage can be widespread. In this book, the authors use a formal, mathematical approach to introduce their recent research findings to describe and design attack and defense strategies using game theoretic method. The book is divided into three sections, focusing on strategies for resilience against deception attacks and DoS attacks, and protecting cloud control systems against threats. In these sections, the authors address topics such as secure and distributed filtering, attack detection and disturbance rejection, resilient state estimation, and resilient control, and techniques such as Stackelberg games, hierarchical games, and active eavesdropping. Through this book readers will be able to design effective defense strategies for complex control system to achieve resilience for closed-control cyber physical systems, network and cloud systems. This book is a vital resource for graduate students and academic researchers who are familiar with the concepts related to cyberattack and defense and who have a related research background. To maximize their benefit from this book, readers are recommended to have a strong mathematical foundation as the book takes a mathematical approach to the concepts and strategies described within.
Cloud Control Systems: Analysis, Design and Estimation introduces readers to the basic definitions and various new developments in the growing field of cloud control systems (CCS). The book begins with an overview of cloud control systems (CCS) fundamentals, which will help beginners to better understand the depth and scope of the field. It then discusses current techniques and developments in CCS, including event-triggered cloud control, predictive cloud control, fault-tolerant and diagnosis cloud control, cloud estimation methods, and secure control/estimation under cyberattacks. This book benefits all researchers including professors, postgraduate students and engineers who are interested in modern control theory, robust control, multi-agents control. Offers insights into the innovative application of cloud computing principles to control and automation systems Provides an overview of cloud control systems (CCS) fundamentals and introduces current techniques and developments in CCS Investigates distributed denial of service attacks, false data injection attacks, resilient design under cyberattacks, and safety assurance under stealthy cyberattacks
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.