This book presents the latest research advances in complex network structure analytics based on computational intelligence (CI) approaches, particularly evolutionary optimization. Most if not all network issues are actually optimization problems, which are mostly NP-hard and challenge conventional optimization techniques. To effectively and efficiently solve these hard optimization problems, CI based network structure analytics offer significant advantages over conventional network analytics techniques. Meanwhile, using CI techniques may facilitate smart decision making by providing multiple options to choose from, while conventional methods can only offer a decision maker a single suggestion. In addition, CI based network structure analytics can greatly facilitate network modeling and analysis. And employing CI techniques to resolve network issues is likely to inspire other fields of study such as recommender systems, system biology, etc., which will in turn expand CI’s scope and applications. As a comprehensive text, the book covers a range of key topics, including network community discovery, evolutionary optimization, network structure balance analytics, network robustness analytics, community-based personalized recommendation, influence maximization, and biological network alignment. Offering a rich blend of theory and practice, the book is suitable for students, researchers and practitioners interested in network analytics and computational intelligence, both as a textbook and as a reference work.
Imaging of tissue blood flow (BF) distributions provides vital information for the diagnosis and therapeutic monitoring of various vascular diseases. The innovative near-infrared speckle contrast diffuse correlation tomography (scDCT) technique produces full 3D BF distributions. Many advanced features are provided over competing technologies including high sampling density, fast data acquisition, noninvasiveness, noncontact, affordability, portability, and translatability across varied subject sizes. The basic principle, instrumentation, and data analysis algorithms are presented in detail. The extensive applications are summarized such as imaging of cerebral BF (CBF) in mice, rat, and piglet animals with skull penetration into deep brain. Clinical human testing results are described by recovery of BF distributions on preterm infants (CBF) through incubator wall, and on sensitive burn tissues and mastectomy skin flaps without direct device-tissue interactions. Supporting activities outlined include integrated capability for acquiring surface curvature information, rapid 2D blood flow mapping, and optimizations via tissue-like phantoms and computer simulations. These applications and activities both highlight and guide the reader as to the expected abilities and limitations of scDCT for adapting into their own preclinical/clinical research, use in constrained environments (i.e., neonatal intensive care unit bedside), and use on vulnerable subjects and measurement sites.
Aerospace vehicles are by their very nature a crucial environment for safety-critical systems. By virtue of an effective safety control system, the aerospace vehicle can maintain high performance despite the risk of component malfunction and multiple disturbances, thereby enhancing aircraft safety and the probability of success for a mission. Autonomous Safety Control of Flight Vehicles presents a systematic methodology for improving the safety of aerospace vehicles in the face of the following occurrences: a loss of control effectiveness of actuators and control surface impairments; the disturbance of observer-based control against multiple disturbances; actuator faults and model uncertainties in hypersonic gliding vehicles; and faults arising from actuator faults and sensor faults. Several fundamental issues related to safety are explicitly analyzed according to aerospace engineering system characteristics; while focusing on these safety issues, the safety control design problems of aircraft are studied and elaborated on in detail using systematic design methods. The research results illustrate the superiority of the safety control approaches put forward. The expected reader group for this book includes undergraduate and graduate students but also industry practitioners and researchers. About the Authors: Xiang Yu is a Professor with the School of Automation Science and Electrical Engineering, Beihang University, Beijing, China. His research interests include safety control of aerospace engineering systems, guidance, navigation, and control of unmanned aerial vehicles. Lei Guo, appointed as "Chang Jiang Scholar Chair Professor", is a Professor with the School of Automation Science and Electrical Engineering, Beihang University, Beijing, China. His research interests include anti-disturbance control and filtering, stochastic control, and fault detection with their applications to aerospace systems. Youmin Zhang is a Professor in the Department of Mechanical, Industrial and Aerospace Engineering, Concordia University, Montreal, Québec, Canada. His research interests include fault diagnosis and fault-tolerant control, and cooperative guidance, navigation, and control (GNC) of unmanned aerial/space/ground/surface vehicles. Jin Jiang is a Professor in the Department of Electrical & Computer Engineering, Western University, London, Ontario, Canada. His research interests include fault-tolerant control of safety-critical systems, advanced control of power plants containing non-traditional energy resources, and instrumentation and control for nuclear power plants.
This book discusses the theory, method and application of non-Gaussian random vibration fatigue analysis and test. The main contents include statistical analysis method of non-Gaussian random vibration, modeling and simulation of non-Gaussian/non-stationary random vibration, response analysis under non-Gaussian base excitation, non-Gaussian random vibration fatigue life analysis, fatigue reliability evaluation of structural components under Gaussian/non-Gaussian random loadings, non-Gaussian random vibration accelerated test method and application cases. From this book, the readers can not only learn how to reproduce the non-Gaussian vibration environment actually experienced by the product, but also know how to evaluate the fatigue life and reliability of the structure under non-Gaussian random excitation.
In this book, the authors highlight the latest research findings on the security and privacy of federated learning systems. The main attacks and counterattacks in this booming field are presented to readers in connection with inference, poisoning, generative adversarial networks, differential privacy, secure multi-party computation, homomorphic encryption, and shuffle, respectively. The book offers an essential overview for researchers who are new to the field, while also equipping them to explore this “uncharted territory.” For each topic, the authors first present the key concepts, followed by the most important issues and solutions, with appropriate references for further reading. The book is self-contained, and all chapters can be read independently. It offers a valuable resource for master’s students, upper undergraduates, Ph.D. students, and practicing engineers alike.
Aerobic granulation technology for wastewater treatment has been widely exploited in recent years. Currently, research on aerobic granulation is been intensively conducted in universities, institutes, private or public interest research organisations world-wide. This book provides the latest research outcomes on the fundamentals and applications of this technology for biological nutrient removal from wastewater. The book offers researchers and practitioners in wastewater treatment engineering up-to-date knowledge and understanding of this novel nutrient removal biotechnology.
This book investigates both theory and various applications of predictive learning control (PLC) which is an advanced technology for complex nonlinear systems. To avoid the difficult modeling problem for complex nonlinear systems, this book begins with the design and theoretical analysis of PLC method without using mechanism model information of the system, and then a series of PLC methods is designed that can cope with system constraints, varying trial lengths, unknown time delay, and available and unavailable system states sequentially. Applications of the PLC on both railway and urban road transportation systems are also studied. The book is intended for researchers, engineers, and graduate students who are interested in predictive control, learning control, intelligent transportation systems and related fields.
This book presents the data privacy protection which has been extensively applied in our current era of big data. However, research into big data privacy is still in its infancy. Given the fact that existing protection methods can result in low data utility and unbalanced trade-offs, personalized privacy protection has become a rapidly expanding research topic.In this book, the authors explore emerging threats and existing privacy protection methods, and discuss in detail both the advantages and disadvantages of personalized privacy protection. Traditional methods, such as differential privacy and cryptography, are discussed using a comparative and intersectional approach, and are contrasted with emerging methods like federated learning and generative adversarial nets. The advances discussed cover various applications, e.g. cyber-physical systems, social networks, and location-based services. Given its scope, the book is of interest to scientists, policy-makers, researchers, and postgraduates alike.
This book offers readers a series of robotic methods for manipulating zebrafish larva, one of the most popular model vertebrates widely used in biomedical research and clinical applications. The authors leverage advanced control theories, image processing algorithms, and artificial intelligence to establish a robot-assisted automated or semi-automated zebrafish larva-targeted micromanipulation system for different experimental purposes. The methods presented are generic and can be translated to manipulate other types of biological objects, such as embryos or cells. Coverage includes topics that span the procedures of manipulating zebrafish larva, such as in-plane positioning, three-dimensional orientation, deformation-controllable immobilization, organ-targeted microinjection, whole-organism imaging, and high-throughput trajectory tracking of zebrafish larvae group movement. Robotic Micromanipulation of Zebrafish Larva is written in a simple, clear, and easy-to-read style. It is an ideal reference for academic researchers and biomedical operators. It is also a valuable resource for students learning robotics, control and system theories, image processing, artificial intelligence, and biomedical engineering.
Computational nanoelectronics is an emerging multi-disciplinary field covering condensed matter physics, applied mathematics, computer science, and electronic engineering. In recent decades, a few state-of-the-art software packages have been developed to carry out first-principle atomistic device simulations. Nevertheless those packages are either black boxes (commercial codes) or accessible only to very limited users (private research codes). The purpose of this book is to open one of the commercial black boxes, and to demonstrate the complete procedure from theoretical derivation, to numerical implementation, all the way to device simulation. Meanwhile the affiliated source code constitutes an open platform for new researchers. This is the first book of its kind. We hope the book will make a modest contribution to the field of computational nanoelectronics.
This book vividly shows the fostering environment, activity characteristics, distribution pattern, economic losses, casualties, disaster risks and management of earthquakes, mass movement, drought, floods, and marine disasters in the Silk Road region. It develops a multi-scale and multi-disaster risk assessment method to better assess and understand the Silk Road disaster risk. A multi-level collaborative risk management model has been proposed for transboundary disasters, and it also shares case studies on major disaster risk management. The book makes a major step forward to increase the understanding of the disaster risk of the Silk Road region. It presents a holistic understanding of the natural hazards and their induced disaster risks and is a valuable read for scholars, stakeholders and practitioners in the DRR community.
This book examines China and Australia’s economic and security relations against the background of China’s increasing economic and political role. Utilizing the theory of complex interdependence, the authors consider whether greater interdependence between Beijing and Canberra augments closer economic cooperation and trade or prompts political leverage and a security challenge. Exploring China-Australia relations from the mainstream Chinese perspective this book will be of interest to scholars and students of international relations, Chinese studies, global political economy, governmental and intergovernmental organizations.
After the failed experiment, Xiao Lei, who received a secret experiment from the United States government, was thrown into the incinerator as a dead man. After the lucky Xiao Lei woke up, he escaped from the United States, sneaked into the country, and with the help of a Chinese couple, survived until he found out that he possessed an incredible Special Ability. Then, due to some coincidence, Zhan Dongyu entered his life, and because of her appearance, he was forced into a race struggle between humans, demons, and zombies.
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.