logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Networked Predictive Control Of Systems With Communication Constraints And Cyber Attacks 1st Ed Zhonghua Pang

  • SKU: BELL-7157228
Networked Predictive Control Of Systems With Communication Constraints And Cyber Attacks 1st Ed Zhonghua Pang
$ 31.00 $ 45.00 (-31%)

4.1

20 reviews

Networked Predictive Control Of Systems With Communication Constraints And Cyber Attacks 1st Ed Zhonghua Pang instant download after payment.

Publisher: Springer Singapore
File Extension: PDF
File size: 8.13 MB
Author: Zhong-Hua Pang, Guo-Ping Liu, Donghua Zhou, Dehui Sun
ISBN: 9789811305191, 9789811305207, 9811305196, 981130520X
Language: English
Year: 2019
Edition: 1st ed.

Product desciption

Networked Predictive Control Of Systems With Communication Constraints And Cyber Attacks 1st Ed Zhonghua Pang by Zhong-hua Pang, Guo-ping Liu, Donghua Zhou, Dehui Sun 9789811305191, 9789811305207, 9811305196, 981130520X instant download after payment.

This book presents the latest results on predictive control of networked systems, where communication constraints (e.g., network-induced delays and packet dropouts) and cyber attacks (e.g., deception attacks and denial-of-service attacks) are considered. For the former, it proposes several networked predictive control (NPC) methods based on input-output models and state-space models respectively. For the latter, it designs secure NPC schemes from the perspectives of information security and real-time control. Furthermore, it uses practical experiments to demonstrate the effectiveness and applicability of all the methods, bridging the gap between control theory and practical applications. The book is of interest to academic researchers, R&D engineers, and graduate students in control engineering, networked control systems and cyber-physical systems.

Related Products