This book contains original research chapters related to the interdisciplinary field of complex networks spanning biological and environmental networks, social, technological, and economic networks.
This book addresses a key technology for digital information processing: Kalman filtering, which is generally considered to be one of the greatest discoveries of the 20th century.
This book gathers the proceedings of the 12th International Conference on Measurement and Quality Control - Cyber Physical Issues (IMEKO TC 14 2019), held in Belgrade, Serbia, on 4-7 June 2019.
This book, now in its third edition, offers a practical guide to the use of probability and statistics in experimental physics that is of value for both advanced undergraduates and graduate students.
This monograph is the first of its kind to present innovative research results on truncated predictor feedback (TPF) designs for general linear systems with input delay.
This book contains contributions from the participants of the research group hosted by the ZiF - Center for Interdisciplinary Research at the University of Bielefeld during the period 2013-2017 as well as from the conclusive conference organized at Bielefeld in December 2017.
This book offers a systematic and rigorous treatment of continuous-time Markov decision processes, covering both theory and possible applications to queueing systems, epidemiology, finance, and other fields.
This book is a course-tested primer on the thermodynamics of strongly interacting matter - a profound and challenging area of both theoretical and experimental modern physics.
This volume presents the proceedings of the meeting New Trends in One-Dimensional Dynamics, which celebrated the 70th birthday of Welington de Melo and was held at the IMPA, Rio de Janeiro, in November 2016.
Modern developments of Random Matrix Theory as well as pedagogical approaches to the standard core of the discipline are surprisingly hard to find in a well-organized, readable and user-friendly fashion.
This book presents solutions to control problems in a number of robotic systems and provides a wealth of worked-out examples with full analytical and numerical details, graphically illustrated to aid in reader comprehension.
Crime Scene Investigation Laboratory Manual, Second Edition, is written by a former crime scene investigator and forensic scientist who provides practical, straightforward, and immediately applicable best practices.
Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking provides readers with a deeper understanding of the hacking threats that exist with mobile phones, laptops, routers, and navigation systems.
Forensic Examination of Signatures explains the neuroscience and kinematics of signature production, giving specific details of research carried out on the topic.
In our attempts to understand crime, researchers typically focus on proximate factors such as the psychology of offenders, their developmental history, and the social structure in which they are embedded.
Forensic Handwriting Identification: Fundamental Concepts and Principles teaches the law enforcement and legal communities the major principles involved in handwriting and hand-printing analysis as applied to many types of investigations, including fraud, homicide, suicide, drug trafficking/clandestine labs, sexual offenses, threats and extortion, blackmail, arson, bombings, and theft.
Data Mining and Predictive Analysis: Intelligence Gathering and Crime Analysis, 2nd Edition, describes clearly and simply how crime clusters and other intelligence can be used to deploy security resources most effectively.
Cell Phone Location Evidence for Legal Professionals: Understanding Cell Phone Location Evidence from the Warrant to the Courtroom is a guide, in plain language, for digital forensics professionals, attorneys, law enforcement professionals and students interested in the sources, methods and evidence used to perform forensic data analysis of cell phones, call detail records, real time ping records and geo-location data obtained from cellular carriers and cell phones.
Unlike other books, courses and training that expect an analyst to piece together individual instructions into a cohesive investigation, Investigating Windows Systems provides a walk-through of the analysis process, with descriptions of the thought process and analysis decisions along the way.
Forensic Odontology: Principles and Practice details the aspects necessary to become an accomplished forensic odontologist, including an illustration of the skills necessary to become an expert witness.
Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis exposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them.
Police Psychology: New Trends in Forensic Psychological Science is a relatively new specialty that can be broadly defined as the application of psychological principles and methods to assist law enforcement.
Mass Identifications: Statistical Methods in Forensic Genetics summarizes the state-of-the-art in the field, including methods and recent development in genetics (sequencing).
Threat and Violence Interventions: The Effective Application of Influence evaluates threat and violence risk for various levels of mental health practitioners, law enforcement officers, security professionals, human resource professionals, attorneys, and academics in forensic psychology, sociology, criminology and law.
This textbook offers a clear and comprehensive introduction to statistical physics, one of the core components of advanced undergraduate physics courses.
This book aims to bring together researchers and practitioners working across domains and research disciplines to measure, model, and visualize complex networks.
This book briefly summarizes the current state of the art technologies and solutions for location and tracking (L&T) in wireless sensor networks (WSN), focusing on RSS-based schemes.
This book introduces the space community to the novel SpaceFibre protocol, developed under the guidance of the European Space Agency (ESA) as the forthcoming, high speed (Gbps) communication protocol for satellite on-board communication.
This book represents the experience of successful researchers from four continents on a broad range of intelligent systems, and it hints how to avoid anticipated conflicts and problems during multidisciplinary innovative research from Industry 4.
This book provides a modern static imperfect bifurcation theory applicable to bifurcation phenomena of physical and engineering problems and fills the gap between the mathematical theory and engineering practice.
This monograph presents a technique, developed by the author, to design asymptotically exponentially stabilizing finite-dimensional boundary proportional-type feedback controllers for nonlinear parabolic-type equations.