OpenLibra. The free online library that you have waiting for
  1. Wireless Sensor and Actuator Networks for Smart Cities
    Author: Burak Kantarci & Sema Oktug (Eds.)
    Year: 2019
    Publisher: MDPI
    Pages: 170
    Size: 5.83 Mbs (pdf)
    Language: english

    Our lives are being transformed by the interplay between mobile networks, wireless communications and artificial intelligence. This transformation is an outcome of the emerging Internet of Things (IoT) concept, and the advancements in computer architectures that translate into high computing power, high performance processing and huge memory capacities. In addition to the IoT, as a very close concept, cyber-physical systems target seamless integration of physical systems with computing and communication resources. Furthermore, in the urban areas, the integration of the “software-defined sensor networks” and “sensing as a service” concepts with the legacy WSN-based systems is leading to the transformation of the conventional city services towards smart cities. Smart energy, smart driving, smart homes, smart living, smart governance and smart health are just a few services that can be offered by smart cities. Furthermore, while these concepts are the major application areas, smart citizens close the loop by participating in sensing, actuating and decision making processes. In the smart cities, legacy WSN-based services are extended by having citizens act as sensors. Opportunistic or participatory sensing models enable groups of individuals to collaboratively work towards the same goal with strong interaction links even though this does not always require strong social links between them. Thus, dedicated and non-dedicated wireless sensors form communities; collaborating communities form social networks where interaction can occur in the form of software-defined sensing. This transformation in WSNs introduces unique solutions for the communication plane of smart cities. (...) In this Special Issue, we are seeking submissions that focus on novel solutions for wireless sensor and actuator networks in smart cities. This Special Issue invites academic and industry researchers in computer science and engineering, electrical engineering and communication engineering, as well as ICT industry engineers and practitioners, to contribute with original articles in all aspects of wireless sensor network and actuator systems for smart cities.

  2. Optimization in Control Applications
    Author: Guillermo Valencia-Palomo & Francisco Ronay López-Estrada (Eds.)
    Year: 2018
    Publisher: MDPI
    Pages: 258
    Size: 5.74 Mbs (pdf)
    Language: english

    Mathematical optimization is the selection of the best element in a set with respect to a given criterion. Optimization has become one of the most used tools in modern control theory to compute the control law, adjusting the controller parameters (tuning), model fitting, finding suitable conditions in order to fulfill a given closed-loop property among others. In the simplest case, optimization consist in maximize or minimize a function by systematically choosing input values from a valid input set and computing the function value. Nevertheless, real-world control systems need to comply with several conditions and constraints that has to be taken into account in the problem formulation which represent challenges in the application of the optimization algorithms. In this Special Issue call, the aim is to offer a state-of-the-art of the most advanced optimization techniques (online and offline) and its applications in control engineering. Potential topics include (but not limited to):
    • Optimal control of nonlinear systems;
    • Optimal control of complex systems;
    • Predictive control;
    • Optimal observer design;
    • Principal component analysis;
    • Neuronal networks;
    • Numerical optimization;
    • Evolutionary optimization;
    • Constrained optimization;
    • Control systems.

  3. Real-Time Embedded Systems
    Author: Christos Koulamas & Mihai T. Lazarescu
    Year: 2018
    Publisher: MDPI
    Pages: 190
    Size: 4.26 Mbs (pdf)
    Language: english

    Real-time and networked embedded systems are crucial bridges between the physical and the information worlds in the ever growing embedded intelligence pervasiveness in industry, infrastructure, and in public and private spaces. They have been identified as society and economy emerging "neural systems", and as one of the next big concepts supporting societal changes and economic growth. Intelligence is increasingly embedded in everyday life connected objects, fostered by cost/performance improvements and by the spread to wider application fields of the specialized technologies and engineering disciplines once tightened in silo domains. While this process gradually builds the IoT, it starts to expose non trivial timing and other extra functional requirements and system properties, which are less common to typical computing. This Special Issue is dedicated to the specificities of cyberphysical and real time embedded systems that are present both in traditional relevant application domains, such as industrial automation and control, energy management, automotive, aerospace and defense systems, as well as in emerging domains, such as in medical devices, household appliances, mobile multimedia, gaming, and entertainment systems.

  4. A Graduate Course in Applied Cryptography
    Author: Dan Boneh & Victor Shoup
    Year: 2017
    Publisher: Autoedición
    Pages: 818
    Size: 26.01 Mbs (pdf)
    Language: english

    Cryptography is an indispensable tool used to protect information in computing systems. It is used everywhere and by billions of people worldwide on a daily basis. It is used to protect data at rest and data in motion. Cryptographic systems are an integral part of standard protocols, most notably the Transport Layer Security (TLS) protocol, making it relatively easy to incorporate strong encryption into a wide range of applications. While extremely useful, cryptography is also highly brittle. The most secure cryptographic system can be rendered completely insecure by a single specification or programming error. No amount of unit testing will uncover a security vulnerability in a cryptosystem. Instead, to argue that a cryptosystem is secure, we rely on mathematical modeling and proofs to show that a particular system satisfies the security properties attributed to it. We often need to introduce certain plausible assumptions to push our security arguments through. This book is about exactly that: constructing practical cryptosystems for which we can argue security under plausible assumptions. The book covers many constructions for di↵erent tasks in cryptography. For each task we define a precise security goal that we aim to achieve and then present constructions that achieve the required goal. To analyze the constructions, we develop a unified framework for doing cryptographic proofs. A reader who masters this framework will be capable of applying it to new constructions that may not be covered in the book. Throughout the book we present many case studies to survey how deployed systems operate. We describe common mistakes to avoid as well as attacks on real-world systems that illustrate the importance of rigor in cryptography. We end every chapter with a fun application that applies the ideas in the chapter in some unexpected way.

  5. Mechanics and Relativity
    Author: Timon Idema
    Year: 2018
    Publisher: TUDelft
    Pages: 193
    Size: 25.80 Mbs (pdf)
    Language: english

    In Mechanics and Relativity, the reader is taken on a tour through time and space. Starting from the basic axioms formulated by Newton and Einstein, the theory of motion at both the everyday and the highly relativistic level is developed without the need of prior knowledge. The relevant mathematics is provided in an appendix. The text contains various worked examples and a large number of original problems to help the reader develop an intuition for the physics. Applications covered in the book span a wide range of physical phenomena, including rocket motion, spinning tennis rackets and high-energy particle collisions.