This book offers an overview of our current understanding of host defense peptides and their potential for clinical applications as well as some of the obstacles to this. The chapters, written by leading experts in the field, detail the number and diversity of host defense peptides, and discuss the therapeutic potential not only of antibacterial, but also of antifungal, antiviral, plant antimic…
This book discusses how to combine type-2 fuzzy sets and graphical models to solve a range of real-world pattern recognition problems such as speech recognition, handwritten Chinese character recognition, topic modeling as well as human action recognition. It covers these recent developments while also providing a comprehensive introduction to the fields of type-2 fuzzy sets and graphical model…
A solution permitting the stabilization of 2-dimensional (2-D) continuous-time saturated system under state feedback control is presented in this book. The problems of delay and saturation are treated at the same time. The authors obtain novel results on continuous 2-D systems using the unidirectional Lyapunov function. The control synthesis and the saturation and delay conditions are presented…
This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and software for embedded systems, and the authors describe specific solutions to create security features. …
This is a self-contained exposition by one of the leading experts in lattice theory, George Grätzer, presenting the major results of the last 70 years on congruence lattices of finite lattices, featuring the author's signature Proof-by-Picture method. Key features: * Insightful discussion of techniques to construct "nice" finite lattices with given congruence lattices and "nice" congruen…
This chapter introduces “message processing” as a study of human communication processes, with a focus on how people create understanding in interaction. It explains how “message processing” contrasts with traditional approaches to studying human communication (which typically focus on outcomes that follow from communicating in particular ways, rather than how communication itself works…
This book describes a novel approach for the design of embedded systems and industrial automation systems, using a unified model-driven approach that is applicable in both domains. The authors illustrate their methodology, using the IEC 61499 standard as the main vehicle for specification, verification, static timing analysis and automated code synthesis. The well-known synchronous approach i…
The canonical way to establish the central limit theorem for i.i.d. random variables is to use characteristic functions and Lévy’s continuity theorem. This monograph focuses on this characteristic function approach and presents a renormalization theory called mod-ϕ convergence. This type of convergence is a relatively new concept with many deep ramifications, and has not previously been pub…
This contributed volume regenerates the significance of and respect for natural phenomenon in the background of the risks and complications seen in ART such as ovarian hyperstimulation and multiple pregnancies. Balancing the clinical practice between the beneficial natural physiology and the prolific use of stimulation drugs for ART may help eliminate risks that may prove clinically, financia…
This monograph presents a unified approach to model-based processing for underwater acoustic arrays. The use of physical models in passive array processing is not a new idea, but it has been used on a case-by-case basis, and as such, lacks any unifying structure. This work views all such processing methods as estimation procedures, which then can be unified by treating them all as a form of joi…