Computer Networking : Principles, Protocols and Practice" is an open-source ebook that explains the main principles of Computer Networking and the key protocols that are used on the Internet. The first part describes the theoretical foundations of this domain as well and the main algorithms and protocols. The ebook is intended to be used for an upper-level undergraduate networking course. The…
Support Vector Machines - One of the most successful learning algorithms; getting a complex model at the price of a simple one. Lecture 14 of 18 of Caltech's Machine Learning Course - CS 156 by Professor Yaser Abu-Mostafa. View course materials in iTunes U Course App - https://itunes.apple.com/us/course/machine-learning/id515364596 and on the course website - http://work.caltech.edu/telecourse.…
This volume presents several case studies highlighting the latest findings in Industry 4.0 projects utilizing S-BPM features. Their potential is explored in detail, while the limits of engineering a company from a communication-centred perspective are also discussed. After a general introduction and an overview of the book in chapter 1, chapter 2 starts by condensing the industrial challenges d…
Today, most people are experienced with computer programs, typically programs such as Word, Excel, PowerPoint, Internet Explorer, and Photoshop. The interaction with such programs is usually quite simple and intuitive: you click on buttons, pull down menus and select operations, drag visual elements into locations, and so forth. The possible operations you can do in these programs can be combin…
This open access book mainly focuses on the safe control of robot manipulators. The control schemes are mainly developed based on dynamic neural network, which is an important theoretical branch of deep reinforcement learning. In order to enhance the safety performance of robot systems, the control strategies include adaptive tracking control for robots with model uncertainties, compliance cont…
Database Design - 2nd Edition covers database systems and database design concepts. New to this edition are SQL info, additional examples, key terms and review exercises at the end of each chapter.
Nowadays, everyone is using the Internet. We have hooked our computers to the Internet, where we can access information and transmit messages. The Internet is a very large computer network. Computer networks are so important in our daily life that they have become indispensable to us. The closest cousin of a computer network is a transportation network, but computer networks are now taking…
Currently, at the dawn of 5G networks, and the era of the Internet-of-Things, wireless and mobile networking is becoming increasingly ubiquitous. In this landscape, security and privacy turn into decisive factors. That is, the mobile and wireless ecosystem is an ideal playground for many perpetrators: (a) handheld devices are used for critical tasks, such as e-commerce, bank transactions, payme…