|
|
|
|
| | | | Terrorism Informatics: Knowledge Management and Data Mining for Homeland SecurityTerrorism informatics has been defined as the application of advanced methodologies, information fusion and analysis techniques to acquire, integrate process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications. The wide variety of methods used in terrorism informatics are... |
|
|
|
Topics in Geometry, Coding Theory and Cryptography (Algebra and Applications)The purpose of this reviewarticle is to serve as an introduction and at the same time, as an invitation to the theory of towers of function fields over finite fields. More specifically, we treat here the case of explicit towers; i.e., towers where the function fields are given by explicit equations. The asymptotic behaviour of the genus and of the... | | Beyond Reason: Eight Great Problems That Reveal the Limits of ScienceA mind-bending excursion to the limits of science and mathematics Are some scientific problems insoluble? In Beyond Reason, internationally acclaimed math and science author A. K. Dewdney answers this question by examining eight insurmountable mathematical and scientific roadblocks that have stumped thinkers across the... | | Decision Making and Programming
The problem of selection of alternatives or the problem of decision making in the modern world has become the most important class of problems constantly faced by business people, researchers, doctors and engineers. The fields that are almost entirely focused on conflicts, where applied mathematics is successfully used, are law, military... |
|
|
Result Page: 153 152 151 150 149 148 147 146 145 144 143 142 141 140 139 138 |