"Although state variable concepts are a part of modern control theory, they have not been extensively applied in communication theory. The purpose of this book is to demonstrate how the concepts and methods of state variables can be used advantageously in analyzing a variety of communication theory problems. In contrast to the impulse response and covariance function description of systems and …
"A Bradford book."OCLC-licensed vendor bibliographic record.
"A Bradford book."OCLC-licensed vendor bibliographic record.
"A Bradford book."In the contentious debate among contemporary epistemologists and philosophers regarding justification, there is one consensus: justification is distinct from knowledge; there are justified beliefs that do not amount to knowledge, even if all instances of knowledge are instances of justified belief. In Without Justification, Jonathan Sutton forcefully opposes this claim. He pro…
This book examines theoretical and applied aspects of wavelet analysis in neurophysics, describing in detail different practical applications of the wavelet theory in the areas of neurodynamics and neurophysiology and providing a review of fundamental work that has been carried out in these fields over the last decade. Chapters 1 and 2 introduce and review the relevant foundations of neuroph…
Based on the author’s twenty years of experience, this book shows the practicality of modern, conceptually new, wide area voltage control in transmission and distribution smart grids, in detail. Evidence is given of the great advantages of this approach, as well as what can be gained by new control functionalities which modern technologies now available can provide. The distinction between s…
Modern imaging techniques and computational simulations yield complex multi-valued data that require higher-order mathematical descriptors. This book addresses topics of importance when dealing with such data, including frameworks for image processing, visualization and statistical analysis of higher-order descriptors. It also provides examples of the successful use of higher-order descriptors …
This book addresses the fundamental concepts in the theory and practice of visual cryptography. The design, construction, analysis, and application of visual cryptography schemes (VCSs) are discussed in detail. Original, cutting-edge research is presented on probabilistic, size invariant, threshold, concolorous, and cheating immune VCS. This updated second edition has also been expanded with ne…
The interdisciplinary research and development work carried out in the last ten years which is presented in this book aimed at replacing the conventional airport control tower by a new “remote tower operation” work environment (RTO) which should enhance work efficiency and safety and reduce costs. This revolutionary human–system interface allows for remote aerodrome traffic control withou…
The second edition of this book updates and expands upon a historically important collection of mathematical problems first published in the United States by Birkhäuser in 1981. These problems serve as a record of the informal discussions held by a group of mathematicians at the Scottish Café in Lwów, Poland, between the two world wars. Many of them were leaders in the development of such ar…