Home | Amazing | Today | Tags | Publishers | Years | Search 
Non-linear Modeling and Analysis of Solids and Structures
Non-linear Modeling and Analysis of Solids and Structures
This book presents a theoretical treatment of nonlinear behavior of solids and structures in such a way that it is suitable for numerical computation, typically using the Finite Element Method. Starting out from elementary concepts, the author systematically uses the principle of virtual work, initially illustrated by truss structures, to give a...
Algorithms and Programming: Problems and Solutions (Modern Birkhäuser Classics)
Algorithms and Programming: Problems and Solutions (Modern Birkhäuser Classics)
Somebody once said that one may prove the correctness of an algorithm, but not of a program. One of the main goals of this book is to convince the reader that things are not so bad.

A well-known programmer, C.A.R. Hoare, said that the beauty of a program is not an additional benefit but a criterion that separates success from failure.
...
High-Level Data Fusion
High-Level Data Fusion
Master cutting-edge Level 2 fusion techniques that help you develop powerful situation assessment services with eye-popping capabilities and performance with this trail-blazing resource. The book explores object and situation fusion processes with an appropriate handling of uncertainties, and applies cutting-edge artificial intelligence and...
Exploratory Data Analysis with MATLAB (Chapman & Hall/CRC Computer Science & Data Analysis)
Exploratory Data Analysis with MATLAB (Chapman & Hall/CRC Computer Science & Data Analysis)

Exploratory data analysis (EDA) was conceived at a time when computers were not widely used, and thus computational ability was rather limited. As computational sophistication has increased, EDA has become an even more powerful process for visualizing and summarizing data before making model assumptions to generate hypotheses, encompassing...

Cluster Analysis for Data Mining and System Identification
Cluster Analysis for Data Mining and System Identification

Data clustering is a common technique for statistical data analysis, which is used in many fields, including machine learning, data mining, pattern recognition, image analysis and bioinformatics. Clustering is the classification of similar objects into different groups, or more precisely, the partitioning of a data set into subsets...

Computational Intelligence in Optimization: Applications and Implementations (Adaptation, Learning, and Optimization)
Computational Intelligence in Optimization: Applications and Implementations (Adaptation, Learning, and Optimization)

Optimization is an integral part to science and engineering. Most real-world applications involve complex optimization processes, which are difficult to solve without advanced computational tools. With the increasing challenges of fulfilling optimization goals of current applications there is a strong drive to advance the development of...

Evolving Fuzzy Systems - Methodologies, Advanced Concepts and Applications
Evolving Fuzzy Systems - Methodologies, Advanced Concepts and Applications

In today’s real-world applications, there is an increasing demand of integrating new information and knowledge on-demand into model building processes to account for changing system dynamics, new operating conditions, varying human behaviors or environmental influences.

Evolving fuzzy systems (EFS) are a powerful tool...

Coding for Data and Computer Communications
Coding for Data and Computer Communications

On the evening of 23 June 1995, the well-known painter Franz Hutting (not his real name) sent a digitized copy of his latest masterpiece Barricade from his studio in New York to his friend Percival Bartlebooth in Paris. In itself, this data transmission was not different from the millions of other, similar transmissions taking place all over...

Automatic Digital Document Processing and Management: Problems, Algorithms and Techniques
Automatic Digital Document Processing and Management: Problems, Algorithms and Techniques

This text reviews the issues involved in handling and processing digital documents. Examining the full range of a document’s lifetime, the book covers acquisition, representation, security, pre-processing, layout analysis, understanding, analysis of single components, information extraction, filing, indexing and retrieval. Features:...

Prescribing for Elderly Patients
Prescribing for Elderly Patients

As our population ages, clinicians are faced with an increasing number of elderly patients with multiple medical problems and prescribed medications both in the acute and in the chronic setting. The clinical presentation of common conditions often differs from other age groups and the risk of drug–drug interactions is high, leading to...

Data Mining and Knowledge Discovery via Logic-Based Methods: Theory, Algorithms, and Applications
Data Mining and Knowledge Discovery via Logic-Based Methods: Theory, Algorithms, and Applications

There are many approaches to data mining and knowledge discovery (DM&KD), including neural networks, closest neighbor methods, and various statistical methods. This monograph, however, focuses on the development and use of a novel approach, based on mathematical logic, that the author and his research associates have worked on over the...

Group-based Cryptography (Advanced Courses in Mathematics - CRM Barcelona)
Group-based Cryptography (Advanced Courses in Mathematics - CRM Barcelona)

This book is about relations between three different areas of mathematics and theoretical computer science: combinatorial group theory, cryptography, and complexity theory. It is explored how non-commutative (infinite) groups, which are typically studied in combinatorial group theory, can be used in public key cryptography. It is also shown...

Result Page: 200 199 198 197 196 195 194 193 192 191 190 189 188 187 186 185 184 183 182 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy