This book offers advanced iterative learning control (ILC) and optimization methods for industrial batch systems, facilitating engineering applications subject to time- and batch-varying process uncertainties that could not be effectively addressed by the existing ILC methods.
This book offers advanced iterative learning control (ILC) and optimization methods for industrial batch systems, facilitating engineering applications subject to time- and batch-varying process uncertainties that could not be effectively addressed by the existing ILC methods.
This book provides a comprehensive overview of the latest applications of laser-induced breakdown spectroscopy (LIBS) in the environmental and forensic sciences along with chemometric methods.
This book is an exploration of paramount significance, delving into the fundamental principles, methodologies, and cutting-edge techniques that underpin the discipline of environmental forensics.
This book is an exploration of paramount significance, delving into the fundamental principles, methodologies, and cutting-edge techniques that underpin the discipline of environmental forensics.
This edited book presents recent findings on use of IoT-based monitoring systems to analyse functional frameworks for intelligent computational analysis of sustainable agricultural system, field monitoring and automation systems, agriculture sensor network, sensor-based precision agriculture, expert systems for soil management, remote monitoring and predictive analysis systems, AI-based emergency alert systems, crop monitoring, AI-based predictive analysis, smart irrigation, and data acquisition security.
This edited book presents recent findings on use of IoT-based monitoring systems to analyse functional frameworks for intelligent computational analysis of sustainable agricultural system, field monitoring and automation systems, agriculture sensor network, sensor-based precision agriculture, expert systems for soil management, remote monitoring and predictive analysis systems, AI-based emergency alert systems, crop monitoring, AI-based predictive analysis, smart irrigation, and data acquisition security.
The book develops the tools to describe equilibrium thermal properties and near-equilibrium processes of finite size particles, with the emphasis on gas phase particles.
The book develops the tools to describe equilibrium thermal properties and near-equilibrium processes of finite size particles, with the emphasis on gas phase particles.
This book consists of a collection of the high-quality research articles in the field of computer vision and robotics which are presented at the International Conference on Computer Vision and Robotics (CVR 2025), organized by National Institute of Technology, Goa, India, during 25–26 April 2025.
This book consists of a collection of the high-quality research articles in the field of computer vision and robotics which are presented at the International Conference on Computer Vision and Robotics (CVR 2025), organized by National Institute of Technology, Goa, India, during 25–26 April 2025.
This book includes research papers presented at the International Conference on Data Science and Network Engineering (ICDSNE 2025) organized by the Department of Computer Science and Engineering, National Institute of Technology Agartala, Tripura, India, during July 18–19, 2025.
This book includes research papers presented at the International Conference on Data Science and Network Engineering (ICDSNE 2025) organized by the Department of Computer Science and Engineering, National Institute of Technology Agartala, Tripura, India, during July 18–19, 2025.
This volume constitutes the proceedings of Third International Conference on Artificial Intelligence of Things and Systems, AIoTSys 2025, held in Lanzhou, China, during August 15–17, 2025.
This volume constitutes the proceedings of Third International Conference on Artificial Intelligence of Things and Systems, AIoTSys 2025, held in Lanzhou, China, during August 15–17, 2025.
The book covers a wide array of rhythmic phenomena in plants, ranging from diurnal and circadian rhythms to underexplored topics such as rhizomicrobiome and algae rhythms.
The book covers a wide array of rhythmic phenomena in plants, ranging from diurnal and circadian rhythms to underexplored topics such as rhizomicrobiome and algae rhythms.
Complementarity functions lie at the heart of modern optimization, offering a powerful way to reformulate the Karush-Kuhn-Tucker (KKT) conditions and the original optimization problem into more tractable forms, either as systems of equations or unconstrained minimization problems.
This book offers a comprehensive and systematic exploration of control design and analysis for interval type-2 fuzzy systems under constrained communication networks.
This book focuses on the integration of Artificial Intelligence (AI) technology for securing IoT next systems, exploring a comprehensive collection of recent techniques and strategies aimed at protecting these complex networks.
This book constitutes the refereed proceedings of the International Ethical Hacking Conference, eHaCON 2025, the 6th international conference of its type held in Kolkata, India, in February 2025.
This book offers a comprehensive and systematic exploration of control design and analysis for interval type-2 fuzzy systems under constrained communication networks.
This book constitutes the refereed proceedings of the International Ethical Hacking Conference, eHaCON 2025, the 6th international conference of its type held in Kolkata, India, in February 2025.
This book is the third in a series of books dedicated to publishing extended abstracts of the activities of ICMAM Latin America (International Community of Mathematicians from Latin America).
This book is the third in a series of books dedicated to publishing extended abstracts of the activities of ICMAM Latin America (International Community of Mathematicians from Latin America).
This book represents a comprehensive exploration of the most recent advancements and applications at the intersection of machine learning, cyber-physical systems, and industrial processes.
Complementarity functions lie at the heart of modern optimization, offering a powerful way to reformulate the Karush-Kuhn-Tucker (KKT) conditions and the original optimization problem into more tractable forms, either as systems of equations or unconstrained minimization problems.
This book presents key technologies and applications of smart cities, covering a wide range of areas including smart transportation, autonomous driving, wireless communication, artificial intelligence, the Internet of Things (IoT), cybersecurity, digital twins, disaster management, environmental monitoring, and smart buildings.
This book covers knowledge and skills needed to successfully handle the tasks, duties, and responsibilities of an associate-level Security Analyst working in a Security Operations Center.
This book presents a general approach to block and recursive filtering, identification, and control, using signal observations processing techniques, and among others provides to the reader these results:The new version of least square algorithm that is speeded up without changing its adaptive characteristics, increasing the parallelism in algorithm.
This book presents key technologies and applications of smart cities, covering a wide range of areas including smart transportation, autonomous driving, wireless communication, artificial intelligence, the Internet of Things (IoT), cybersecurity, digital twins, disaster management, environmental monitoring, and smart buildings.
This book offers readers an innovative perspective on how intelligent networks can evolve beyond simple device-to-device communication, enabling social interaction, adaptive learning, and predictive intelligence across various domains.
This book represents a comprehensive exploration of the most recent advancements and applications at the intersection of machine learning, cyber-physical systems, and industrial processes.
This book demonstrates how information security requires a deep understanding of organizations assets, threats, and processes, combined with security measures that can best protect their information security.
This book compiles the proceedings of the 16th International Conference on Complex Networks (CompleNet 2025), a distinguished gathering that has united researchers and practitioners from diverse fields since 2009.