Posted by **ChrisRedfield** at Oct. 4, 2014

Published: 2006-12-01 | ISBN: 1846285941, 1849966257 | PDF | 178 pages | 3 MB

Posted by **MoneyRich** at Sept. 26, 2014

Springer; 2nd Edition | January 19, 2007 | English | ISBN: 184628595X | 178 pages | PDF | 1 MB

A self-contained introduction to algebraic control for nonlinear systems suitable for researchers and graduate students. 'Algebraic Methods for Nonlinear Control Systems' develops a linear-algebraic alternative to the usual differential-geometric approach to nonlinear control, using vector spaces over suitable fields of nonlinear functions. It describes a range of results, some of which can be derived using differential geometry but many of which cannot.

Posted by **tanas.olesya** at Dec. 3, 2014

English | April 28, 1999 | ISBN: 1852331518 | 166 pages | PDF | 3 MB

This book provides a unique and alternative approach to the study of nonlinear control systems, with applications. The approach presented is based on the use of algebraic methods which are intrinsically linear, rather than differential geometric methods, which are more commonly found in other reference works on the subject.

Posted by **libr** at Jan. 7, 2017

English | 2012 | ISBN-10: 1439876622 | 183 pages | PDF | 3,2 MB

Posted by **arundhati** at Dec. 21, 2016

English | ISBN: 3319012878 | 2013 | 290 pages | PDF | 3 MB

Posted by **interes** at Nov. 23, 2016

English | 2016 | ISBN: 3319392271 | 286 pages | PDF | 5 MB

Posted by **roxul** at July 25, 2016

English | ISBN: 3319301675 | 2016 | 696 pages | PDF | 24 MB

Posted by **fdts** at July 16, 2016

by J. D. Lambert

English | 1991 | ISBN: 0471929905 | 304 pages | PDF | 18.03 MB

Posted by **thingska** at April 4, 2016

English | Jan. 4, 2007 | ISBN: 1576753794 | 732 Pages | PDF | 8.5 MB

Posted by **AlenMiler** at March 26, 2016

English | Mar 30, 2016 | ISBN: 1498734731 | 325 Pages | AZW4/PDF (True) | 14.06 MB

Cyber Security for Industrial Control Systems: From the Viewpoint of Close-Loop provides a comprehensive technical guide on up-to-date new secure defending theories and technologies, novel design, and systematic understanding of secure architecture with practical applications.