Adaptive Dynamic Programming for Control [[electronic resource] ] : Algorithms and Stability / / by Huaguang Zhang, Derong Liu, Yanhong Luo, Ding Wang |
Autore | Zhang Huaguang |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | London : , : Springer London : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (431 p.) |
Disciplina | 629.836 |
Collana | Communications and Control Engineering |
Soggetto topico |
Control engineering
Mathematical optimization Artificial intelligence Computational intelligence System theory Control and Systems Theory Optimization Artificial Intelligence Computational Intelligence Systems Theory, Control |
ISBN |
1-4471-4757-X
1-283-93343-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Optimal Stabilization Control for Discrete-time Systems -- Optimal Tracking Control for Discrete-time Systems -- Optimal Stabilization Control for Nonlinear Systems with Time Delays -- Optimal Tracking Control for Nonlinear Systems with Time-delays -- Optimal Feedback Control for Continuous-time Systems via ADP -- Several Special Optimal Feedback Control Designs Based on ADP -- Zero-sum Games for Discrete-time Systems Based on Model-free ADP -- Nonlinear Games for a Class of Continuous-time Systems Based on ADP -- Other Applications of ADP. |
Record Nr. | UNINA-9910437907603321 |
Zhang Huaguang | ||
London : , : Springer London : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Adaptive Dynamic Programming with Applications in Optimal Control [[electronic resource] /] / by Derong Liu, Qinglai Wei, Ding Wang, Xiong Yang, Hongliang Li |
Autore | Liu Derong |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XXX, 594 p. 203 illus., 175 illus. in color.) |
Disciplina | 670.427 |
Collana | Advances in Industrial Control |
Soggetto topico |
Control engineering
Computational intelligence Statistical physics Control and Systems Theory Computational Intelligence Applications of Nonlinear Dynamics and Chaos Theory |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | History of Adaptive Dynamic Programming -- Part I: Continuous-Time Systems -- Optimal Control of Continuous-Time Affine Nonlinear Systems -- Optimal Control of Nonaffine Continuous-Time Systems -- Robust and Guaranteed Cost Control of Continuous-Time Nonlinear Systems -- Decentralized Stabilization and Control of Nonlinear Interconnected Systems -- Online Synchronous Optimal Learnign Algorithms for Multiplayer Nonzero-Sum Games with Unknown Dynamics -- Part II: Discrete-Time Systems -- Value Iteration Adaptive Dynamic Programming for Discrete-Time Nonlinear Systems -- Finite Approximation Error-Based Value Iteration for Adaptive Dynamic Programming -- Policy Iteration for Optimal Control of Discrete-Time Nonlinear Systems -- Generalized Policy Iteration Adaptive Dynamic Programming for Discrete-Time Nonlinear Systems -- Error-Bound Analysis of Adaptive Dynamic Programming Algorithms for Solving Undiscounted Optimal Control Problems -- Part III: Applications -- Adaptive Dynamic Programming for Renewable Energy Scheduling and Battery Management in Smart Homes -- Adaptive Dynamic Programming for Optimal Tracking Control of a Coal Gasification Process -- Data-Driven Neuro-Optimal Temperature Control of Water–Gas Shift Reaction. |
Record Nr. | UNINA-9910158672003321 |
Liu Derong | ||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security and privacy in new computing environments : 5th EAI International Conference, SPNCE 2022, Xi'an, China, December 30-31, 2022, proceedings / / edited by Qi Jiang, Xinghua Li, and Ding Wang |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2023] |
Descrizione fisica | 1 online resource (187 pages) |
Disciplina | 929.605 |
Collana | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
Soggetto topico | Computer networks - Security measures |
ISBN |
9783031306235
9783031306228 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Authentication and key agreement -- User Authentication Using Body Vibration Characteristics -- An Improved Authenticated Key Agreement Protocol for IoT and Cloud Server -- Efficient two-party authentication key agreement protocol using reconciliation mechanism from lattice -- Anonymous and Practical Multi-Factor Authentication for Mobile Devices Using Two-Server Architecture -- Data security -- Cross-chain Data Auditing for Medical IoT Data -- Outsourced Privacy-Preserving SVM Classifier Model over Encrypted Data in IoT -- A Scheme of Anti Gradient Leakage of Federated Learning Based on Blockchain -- Analysis of a New Improved AES S-box Structure Rong -- Network security -- Social Internet of Tings trust management based on implicit social relationship -- Romeo: SGX-based Software Anti-Piracy Framework -- P-TECS: An Energy Balance Algorithm for Opportunistic Networks Integrating Multiple Node Attributes -- Network Situation Awareness Model based on Incomplete Information Game. |
Record Nr. | UNINA-9910720084703321 |
Cham, Switzerland : , : Springer, , [2023] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security and privacy in new computing environments : 5th EAI International Conference, SPNCE 2022, Xi'an, China, December 30-31, 2022, proceedings / / edited by Qi Jiang, Xinghua Li, and Ding Wang |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2023] |
Descrizione fisica | 1 online resource (187 pages) |
Disciplina | 929.605 |
Collana | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
Soggetto topico | Computer networks - Security measures |
ISBN |
9783031306235
9783031306228 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Authentication and key agreement -- User Authentication Using Body Vibration Characteristics -- An Improved Authenticated Key Agreement Protocol for IoT and Cloud Server -- Efficient two-party authentication key agreement protocol using reconciliation mechanism from lattice -- Anonymous and Practical Multi-Factor Authentication for Mobile Devices Using Two-Server Architecture -- Data security -- Cross-chain Data Auditing for Medical IoT Data -- Outsourced Privacy-Preserving SVM Classifier Model over Encrypted Data in IoT -- A Scheme of Anti Gradient Leakage of Federated Learning Based on Blockchain -- Analysis of a New Improved AES S-box Structure Rong -- Network security -- Social Internet of Tings trust management based on implicit social relationship -- Romeo: SGX-based Software Anti-Piracy Framework -- P-TECS: An Energy Balance Algorithm for Opportunistic Networks Integrating Multiple Node Attributes -- Network Situation Awareness Model based on Incomplete Information Game. |
Record Nr. | UNISA-996547950603316 |
Cham, Switzerland : , : Springer, , [2023] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Security and Privacy in New Computing Environments : third EAI international conference, SPNCE 2020, Lyngby, Denmark, August 6-7, 2020, proceedings / / Ding Wang, Weizhi Meng, Jinguang Han (editors) |
Edizione | [1st ed. 2021.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (XIII, 462 p. 122 illus., 108 illus. in color.) |
Disciplina | 004 |
Collana | Lecture notes of the Institute for Computer Sciences, Social Informatics, and Telecommunications Engineering |
Soggetto topico | Cloud computing - Security measures |
ISBN | 3-030-66922-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Network Security -- A Characterisation of Smart Grid DoS Attacks -- Security and Privacy in 5G Applications: Challenges and Solutions -- Alarm Elements based Adaptive Network Security Situation Prediction Model -- Watermark based Tor Cross-domain Tracking System For Tor Network Traceback -- System Security -- Research on IoT Security Technology and Standardization in the 5G Era -- MIMEC Based Information System Security Situation Assessment Model -- IoTFC: A Secure and Privacy Preserving Architecture for Smart Buildings -- A Secure Experimentation Sandbox for the design and execution of trusted and secure analytics in the aviation domain -- Machine Learning -- Research on a Hybrid EMD-SVR Model for Time Series Prediction -- Distant Supervision for Relations Extraction via Deep Residual Learning and Multi-Instance Attention in Cybersecurity -- User Identity Linkage across Social Networks based on Neural Tensor Network -- An Efficient and Privacy-Preserving Physiological Case Classification Scheme for E-healthcare System -- A multi-class detection system for Android malicious Apps based on color image features -- Authentication and Access Control -- PUF-based Two-factor Group Authentication in Smart Home -- An Authentication Framework in ICN-enabled Industrial Cyber-Physical Systems -- Access Control for Wireless Body Area Networks -- FIDO - that dog won’t hunt -- Blockchain-enabled user authentication in zero trust Internet of Things -- Cloud Security -- Security Analysis and Improvement of a Dynamic-Hash-Table based Auditing Scheme for Cloud Storage -- A Public Auditing Framework against Malicious Auditors for Cloud Storage based on Blockchain -- A Secure and Verifiable Outsourcing Scheme for Machine Learning Data -- Support Vector Machine Intrusion Detection Scheme Based on Cloud-Fog Collaboration -- An Multi-feature Fusion Object Detection System for Mobile IoT Devices and Edge Computing -- Cryptography -- Generative image steganography based on digital Cardan Grille -- Pixel Grouping Based Image Hashing for DIBR 3D Image -- Improved Conditional Differential Analysis on NLFSR Based Block Cipher KATAN32 with MILP -- Applied Cryptography -- A Verifiable Combinatorial Auction Scheme with Bidder’s Privacy Protection -- A Multi-user Shared Searchable Encryption Scheme Supporting SQL Query -- Forward Secure Searchable Encryption with Conjunctive-Keyword Supporting Multi-User -- A3BAC: Attribute-Based Access Control Model with Anonymous Access -- Blockchain-based Decentralized Privacy-Preserving Data Aggregation (BDPDA) Scheme for Smart Grid. |
Record Nr. | UNINA-9910484752803321 |
Cham, Switzerland : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security and Privacy in New Computing Environments : third EAI international conference, SPNCE 2020, Lyngby, Denmark, August 6-7, 2020, proceedings / / Ding Wang, Weizhi Meng, Jinguang Han (editors) |
Edizione | [1st ed. 2021.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (XIII, 462 p. 122 illus., 108 illus. in color.) |
Disciplina | 004 |
Collana | Lecture notes of the Institute for Computer Sciences, Social Informatics, and Telecommunications Engineering |
Soggetto topico | Cloud computing - Security measures |
ISBN | 3-030-66922-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Network Security -- A Characterisation of Smart Grid DoS Attacks -- Security and Privacy in 5G Applications: Challenges and Solutions -- Alarm Elements based Adaptive Network Security Situation Prediction Model -- Watermark based Tor Cross-domain Tracking System For Tor Network Traceback -- System Security -- Research on IoT Security Technology and Standardization in the 5G Era -- MIMEC Based Information System Security Situation Assessment Model -- IoTFC: A Secure and Privacy Preserving Architecture for Smart Buildings -- A Secure Experimentation Sandbox for the design and execution of trusted and secure analytics in the aviation domain -- Machine Learning -- Research on a Hybrid EMD-SVR Model for Time Series Prediction -- Distant Supervision for Relations Extraction via Deep Residual Learning and Multi-Instance Attention in Cybersecurity -- User Identity Linkage across Social Networks based on Neural Tensor Network -- An Efficient and Privacy-Preserving Physiological Case Classification Scheme for E-healthcare System -- A multi-class detection system for Android malicious Apps based on color image features -- Authentication and Access Control -- PUF-based Two-factor Group Authentication in Smart Home -- An Authentication Framework in ICN-enabled Industrial Cyber-Physical Systems -- Access Control for Wireless Body Area Networks -- FIDO - that dog won’t hunt -- Blockchain-enabled user authentication in zero trust Internet of Things -- Cloud Security -- Security Analysis and Improvement of a Dynamic-Hash-Table based Auditing Scheme for Cloud Storage -- A Public Auditing Framework against Malicious Auditors for Cloud Storage based on Blockchain -- A Secure and Verifiable Outsourcing Scheme for Machine Learning Data -- Support Vector Machine Intrusion Detection Scheme Based on Cloud-Fog Collaboration -- An Multi-feature Fusion Object Detection System for Mobile IoT Devices and Edge Computing -- Cryptography -- Generative image steganography based on digital Cardan Grille -- Pixel Grouping Based Image Hashing for DIBR 3D Image -- Improved Conditional Differential Analysis on NLFSR Based Block Cipher KATAN32 with MILP -- Applied Cryptography -- A Verifiable Combinatorial Auction Scheme with Bidder’s Privacy Protection -- A Multi-user Shared Searchable Encryption Scheme Supporting SQL Query -- Forward Secure Searchable Encryption with Conjunctive-Keyword Supporting Multi-User -- A3BAC: Attribute-Based Access Control Model with Anonymous Access -- Blockchain-based Decentralized Privacy-Preserving Data Aggregation (BDPDA) Scheme for Smart Grid. |
Record Nr. | UNISA-996464384203316 |
Cham, Switzerland : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|