Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Advanced Technologies in Robotics and Intelligent Systems: Proceedings of ITR 2019 (Mechanisms and Machine Science)

Buy

This volume gathers the latest advances, innovations, and applications in the field of intelligent systems such as robots, cyber-physical and embedded systems, as presented by leading international researchers and engineers at the International Conference on Intelligent Technologies in Robotics (ITR), held in Moscow, Russia on October 21-23, 2019. It covers highly diverse topics, including robotics, design and machining, control and dynamics, bio-inspired systems, Internet of Thing, Big Data, RFID technology, blockchain, trusted software, cyber-physical systems (CFS) security, development of CFS in manufacturing, protection of information in CFS, cybersecurity of CFS. The contributions, which were selected by means of a rigorous international peer-review process, highlight numerous exciting ideas that will spur novel research directions and foster multidisciplinary collaboration among different specialists, demonstrating that intelligent systems will drive the technological and societal change in the coming decades.

(HTML tags aren't allowed.)

Complex Variables Demystified
Complex Variables Demystified
Complex variables, and its more advanced version, complex analysis, is one of the most fascinating areas in pure and applied mathematics. It all started when mathematicians were mystified by equations that could only be solved if you could take the square roots of negative numbers. This seemed bizarre, and back then nobody could imagine that...
Imaging for Forensics and Security: From Theory to Practice (Signals and Communication Technology)
Imaging for Forensics and Security: From Theory to Practice (Signals and Communication Technology)
Imaging for Forensics and Security: From Theory to Practice provides a detailed analysis of new imaging and pattern recognition techniques for the understanding and deployment of biometrics and forensic techniques as practical solutions to increase security. It contains a collection of the recent advances in the technology ranging from...
Non-Binary Error Control Coding for Wireless Communication and Data Storage
Non-Binary Error Control Coding for Wireless Communication and Data Storage

Comprehensive introduction to non-binary error-correction coding techniques

Non-Binary Error Control Coding for Wireless Communication and Data Storage explores non-binary coding schemes that have been developed to provide an alternative to the Reed – Solomon codes, which are expected to become unsuitable for...


Beginning ASP.NET Security (Wrox Programmer to Programmer)
Beginning ASP.NET Security (Wrox Programmer to Programmer)

Programmers: protect and defend your Web apps against attack!

You may know ASP.NET, but if you don't understand how to secure your applications, you need this book. This vital guide explores the often-overlooked topic of teaching programmers how to design ASP.NET Web applications so as to prevent online thefts and...

Mathematical Methods Using Mathematica®: For Students of Physics and Related Fields (Undergraduate Texts in Contemporary Physics)
Mathematical Methods Using Mathematica®: For Students of Physics and Related Fields (Undergraduate Texts in Contemporary Physics)
Intended as a companion for textbooks in mathematical methods for science and engineering, this book presents a large number of numerical topics and exercises together with discussions of methods for solving such problems using Mathematica(R). Although it is primarily designed for use with the author's "Mathematical Methods: For...
Market-Oriented Grid and Utility Computing (Wiley Series on Parallel and Distributed Computing)
Market-Oriented Grid and Utility Computing (Wiley Series on Parallel and Distributed Computing)

The first single-source reference covering the state of the art in grid and utility computing economy research

This book presents the first integrated, single-source reference on market-oriented grid and utility computing. Divided into four main parts—and with contributions from a panel of experts in the field—it...

┬ę2019 LearnIT (support@pdfchm.net) - Privacy Policy