Compartir
Cloud Control Systems: Analysis, Design and Estimation (Emerging Methodologies and Applications in Modelling, Identification and Control) (en Inglés)
Magdi S. Mahmoud; Yuanqing Xia (Autor)
·
Academic Press
· Tapa Blanda
Cloud Control Systems: Analysis, Design and Estimation (Emerging Methodologies and Applications in Modelling, Identification and Control) (en Inglés) - Magdi S. Mahmoud; Yuanqing Xia
$ 186.319
$ 232.899
Ahorras: $ 46.580
Elige la lista en la que quieres agregar tu producto o crea una nueva lista
✓ Producto agregado correctamente a la lista de deseos.
Ir a Mis Listas
Origen: Reino Unido
(Costos de importación incluídos en el precio)
Se enviará desde nuestra bodega entre el
Martes 16 de Julio y el
Viernes 26 de Julio.
Lo recibirás en cualquier lugar de Argentina entre 1 y 3 días hábiles luego del envío.
Reseña del libro "Cloud Control Systems: Analysis, Design and Estimation (Emerging Methodologies and Applications in Modelling, Identification and Control) (en Inglés)"
Cloud Control Systems: Analysis, Design and Estimation introduces readers to the basic definitions and various new developments in the growing field of cloud control systems (CCS). The book begins with an overview of cloud control systems (CCS) fundamentals, which will help beginners to better understand the depth and scope of the field. It then discusses current techniques and developments in CCS, including event-triggered cloud control, predictive cloud control, fault-tolerant and diagnosis cloud control, cloud estimation methods, and secure control/estimation under cyberattacks. This book benefits all researchers including professors, postgraduate students and engineers who are interested in modern control theory, robust control, multi-agents control.Offers insights into the innovative application of cloud computing principles to control and automation systemsProvides an overview of cloud control systems (CCS) fundamentals and introduces current techniques and developments in CCSInvestigates distributed denial of service attacks, false data injection attacks, resilient design under cyberattacks, and safety assurance under stealthy cyberattacks