The goal of this SpringerBrief is to collect and systematically present the state-of-the-art in this research field and the underlying game-theoretic and learning tools to the broader audience with general network security and engineering backgrounds. Particularly, the exposition of this book begins with a brief introduction of relevant background knowledge in Chapter 1, followed by a review of existing applications of SG in addressing various dynamic network security problems in Chapter 2. A detailed treatment of dynamic security games with information asymmetry is given in Chapters 3–5. Specifically, dynamic security games with extra information that concerns security competitions, where the defender has an informational advantage over the adversary are discussed in Chapter 3. The complementary scenarios where the defender lacks information about the adversary is examined in Chapter 4 through the lens of incomplete information SG. Chapter 5 is devoted to the exploration of how to proactively create information asymmetry for the defender’s benefit. The primary audience for this brief includes network engineers interested in security decision-making in dynamic network security problems. Researchers interested in the state-of-the-art research on stochastic game theory and its applications in network security will be interested in this SpringerBrief as well. Also graduate and undergraduate students interested in obtaining comprehensive information on stochastic game theory and applying it to address relevant research problems can use this SpringerBrief as a study guide. Lastly, concluding remarks and our perspective for future works are presented in Chapter 6.
This SpringerBrief provides a comprehensive study of the unique security threats to cognitive radio (CR) networks and a systematic investigation of the state-of-the-art in the corresponding adversary detection problems. In addition, detailed discussions of the underlying fundamental analytical tools and engineering methodologies of these adversary detection techniques are provided, considering that many of them are quite general and have been widely employed in many other related fields. The exposition of this book starts from a brief introduction of the CR technology and spectrum sensing in Chapter 1. This is followed by an overview of the relevant security vulnerabilities and a detailed discussion of two security threats unique to CR networks, namely, the primary user emulation (PUE) attack and the Byzantine attack. To better prepare the reader for the discussions in later chapters, preliminaries of analytic tools related to adversary detection are introduced in Chapter 2. In Chapter 3, a suite of cutting-edge adversary detection techniques tailor-designed against the PUE and the Byzantine attacks are reviewed to provide a clear overview of existing research in this field. More detailed case studies are presented in Chapters 4 – 6. Specifically, a physical-layer based PUE attack detection scheme is presented in Chapter 4, while Chapters 5 and 6 are devoted to the illustration of two novel detection techniques against the Byzantine attack. Concluding remarks and outlooks for future research are provided in Chapter 7. The primary audience for this SpringerBrief include network engineers interested in addressing adversary detection issues in cognitive radio networks, researchers interested in the state-of-the-art on unique security threats to cognitive radio networks and the corresponding detection mechanisms. Also, graduate and undergraduate students interested in obtaining comprehensive information on adversary detection in cognitive radio networks and applying the underlying techniques to address relevant research problems can use this SpringerBrief as a study guide.
Synchronization, consensus and flocking are ubiquitous requirements in networked systems. Pinning Control of Complex Networked Systems investigates these requirements by using the pinning control strategy, which aims to control the whole dynamical network with huge numbers of nodes by imposing controllers for only a fraction of the nodes. As the direct control of every node in a dynamical network with huge numbers of nodes might be impossible or unnecessary, it’s then very important to use the pinning control strategy for the synchronization of complex dynamical networks. The research on pinning control strategy in consensus and flocking of multi-agent systems can not only help us to better understand the mechanisms of natural collective phenomena, but also benefit applications in mobile sensor/robot networks. This book offers a valuable resource for researchers and engineers working in the fields of control theory and control engineering. Housheng Su is an Associate Professor at the Department of Control Science and Engineering, Huazhong University of Science and Technology, China; Xiaofan Wang is a Professor at the Department of Automation, Shanghai Jiao Tong University, China.
The encounter between different minds and perspectives across time and space has always haunted the literary and philosophical imagination. Just such an encounter is staged and played out in this comparative study, which connects the twentieth-century Francophone writers Antonin Artaud (1896-1948) and Henri Michaux (1899-1984) with the ancient Chinese text Zhuangzi (c. 4th-3rd century BCE). These disparate texts are bridged by questions that draw them into close dialogue: how can Artaud and Michaux, who read about and admired ancient Chinese literature and culture, be rethought through certain philosophical concerns that the Zhuangzi raises? If the points of conceptual intersection focus on rationality, cosmology and ethics, what can they tell us about these important issues? By imagining, constructing and developing this thought-encounter, Li re-envisages Artaud, Michaux and the Zhuangzi through the kaleidoscope of comparative interpretation, juxtaposing and recombining ideas and contexts to form new patterns and meanings. Xiaofan Amy Li is Junior Research Fellow in Comparative Literature and Translation at St Anne's College, Oxford University.
Translation and Literature in East Asia: Between Visibility and Invisibility explores the issues involved in translation between Chinese, Japanese and Korean, as well as from these languages into European languages, with an eye to comparing the cultures of translation within East Asia and tracking some of their complex interrelationships. This book reasserts the need for a paradigm shift in translation theory that looks beyond European languages and furthers existing work in this field by encompassing a wider range of literature and scholarship in East Asia. Translation and Literature in East Asia brings together material dedicated to the theory and practice of translation between and from East Asian languages for the first time.
This book serves to deepen the theoretical understanding of mesoscale dynamics and makes its basic concepts clear, reflecting new research results. It emphasizes important theories that have not been given enough attention in recent years, such as generalized potential temperature and the moist potential vorticity theory of non-uniform saturated moist atmospheres. By integrating theory with practice, the book also introduces the forecast method of rainstorms and other disastrous weathers using dynamic factors. This book can be used as a point of reference for operational forecasters, researchers and graduate and undergraduate students whose research interests are atmospheric sciences, and ocean and water sciences. It will also be of interest to scholars who study geological disasters, such as multiphase flow, mountains, debris flows and landslides, as well as geological seismologists.
The goal of this SpringerBrief is to collect and systematically present the state-of-the-art in this research field and the underlying game-theoretic and learning tools to the broader audience with general network security and engineering backgrounds. Particularly, the exposition of this book begins with a brief introduction of relevant background knowledge in Chapter 1, followed by a review of existing applications of SG in addressing various dynamic network security problems in Chapter 2. A detailed treatment of dynamic security games with information asymmetry is given in Chapters 3–5. Specifically, dynamic security games with extra information that concerns security competitions, where the defender has an informational advantage over the adversary are discussed in Chapter 3. The complementary scenarios where the defender lacks information about the adversary is examined in Chapter 4 through the lens of incomplete information SG. Chapter 5 is devoted to the exploration of how to proactively create information asymmetry for the defender’s benefit. The primary audience for this brief includes network engineers interested in security decision-making in dynamic network security problems. Researchers interested in the state-of-the-art research on stochastic game theory and its applications in network security will be interested in this SpringerBrief as well. Also graduate and undergraduate students interested in obtaining comprehensive information on stochastic game theory and applying it to address relevant research problems can use this SpringerBrief as a study guide. Lastly, concluding remarks and our perspective for future works are presented in Chapter 6.
This book provides interpretation of China’s logistics development in a new development paradigm and the rural logistics construction under the Rural Revitalization Strategy. Subjects covered in this book encompass the macro-factors pertaining to the overall development in logistics technologies and facilities, region-specific policies and plans, industry-wide transformation in transport, manufacturing, commerce and agriculture. Specifically, this book highlights the impact of COVID-19 on China’s logistics industry, and demonstrates the efforts and contributions of China’s logistics in the fight against COVID-19 in 2020. Aligns with the previous volumes, the ultimate aim of this book is to present a timely portrait of the rapid growth of China’s logistics market and the status quo of its logistics industry. In so doing, the book offers an in-depth analysis of critical issues involved in the ongoing dynamic and multi-faceted development and provides a valuable reference resource for interested readers in the academic and professional fields.
Complex networks such as the Internet, WWW, transportation networks, power grids, biological neural networks, and scientific cooperation networks of all kinds provide challenges for future technological development. • The first systematic presentation of dynamical evolving networks, with many up-to-date applications and homework projects to enhance study • The authors are all very active and well-known in the rapidly evolving field of complex networks • Complex networks are becoming an increasingly important area of research • Presented in a logical, constructive style, from basic through to complex, examining algorithms, through to construct networks and research challenges of the future
This is an updated and revised second edition of the book presenting new developments in the field of cloud-resolving modeling. The first edition of the book introduces the framework of cloud-resolving model, methodologies for analysis of modeling outputs, and validation of simulations with observations. It details important scientific findings in the aspects of surface rainfall processes, precipitation efficiency, dynamic and thermodynamic processes associated with tropical convection, diurnal variations, radiative and cloud microphysical processes associated with development of cloud clusters, air-sea coupling on convective scales, climate equilibrium states, and remote sensing applications. In additional to the content from the first edition of the book, the second edition of the book contains the new scientific results in the development of convective-stratiform rainfall separation scheme, the analysis of structures of precipitation systems, the thermal effects of doubled carbon dioxide on rainfall, precipitation predictability, and modeling depositional growth of ice crystal. The book will be beneficial both to graduate students and to researchers who do cloud, mesoscale and global modeling.
The book examines surface rainfall processes through cloud-resolving modeling and quantitative analysis of surface rainfall budget and summarizes modeling and analysis results in recent seven years. The book shows validation of precipitation modeling against observations and derives a set of diagnostic precipitation equations. The book provides detailed discussions of the applications of precipitation equations to the examination of effects of sea surface temperature, vertical wind shear, radiation, and ice clouds on torrential rainfall processes in the tropics and mid-latitudes, and to the studies of sensitivity of precipitation modeling to uncertainty of the initial conditions and to the estimate of precipitation efficiency. The book can be used as a text book for graduate students and will be beneficial to researchers and forecasters for precipitation process studies and operational forecasts.
Synchronization, consensus and flocking are ubiquitous requirements in networked systems. Pinning Control of Complex Networked Systems investigates these requirements by using the pinning control strategy, which aims to control the whole dynamical network with huge numbers of nodes by imposing controllers for only a fraction of the nodes. As the direct control of every node in a dynamical network with huge numbers of nodes might be impossible or unnecessary, it’s then very important to use the pinning control strategy for the synchronization of complex dynamical networks. The research on pinning control strategy in consensus and flocking of multi-agent systems can not only help us to better understand the mechanisms of natural collective phenomena, but also benefit applications in mobile sensor/robot networks. This book offers a valuable resource for researchers and engineers working in the fields of control theory and control engineering. Housheng Su is an Associate Professor at the Department of Control Science and Engineering, Huazhong University of Science and Technology, China; Xiaofan Wang is a Professor at the Department of Automation, Shanghai Jiao Tong University, China.
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.