Home | Amazing | Today | Tags | Publishers | Years | Search 
Scientific Investigation of Copies, Fakes and Forgeries
Scientific Investigation of Copies, Fakes and Forgeries

The faking and forgery of works of art and antiquities is probably now more extensive than ever before. The frauds are aided by new technologies, from ink jet printers to epoxy resins, and driven by the astronomic prices realised on the global market.

This book aims to provide a comprehensive survey of the subject over a wide
...

Metamaterials: Theory, Design, and Applications
Metamaterials: Theory, Design, and Applications

Metamaterials:Theory, Design, and Applications goes beyond left-handed materials (LHM) or negative index materials (NIM) and focuses on recent research activity. Included here is an introduction to optical transformation theory, revealing invisible cloaks, EM concentrators, beam splitters, and new-type antennas, a presentation of general...

Cancer Pain: Assessment and Management
Cancer Pain: Assessment and Management

Drs. Eduardo D. Bruera and Russell K. Portenoy have completely revised and updated the widely respected Cancer Pain: Assessment and Management for the second edition of this unanimously praised book. This is a comprehensive, clinically oriented review of all aspects of the complex and multidimensional problem of cancer pain. The unique...

Bioinformatics and Biomarker Discovery
Bioinformatics and Biomarker Discovery

This book is designed to introduce biologists, clinicians and computational researchers to fundamental data analysis principles, techniques and tools for supporting the discovery of biomarkers and the implementation of diagnostic/prognostic systems.

The focus of the book is on how fundamental statistical and data mining approaches...

Large Time Asymptotics for Solutions of Nonlinear Partial Differential Equations
Large Time Asymptotics for Solutions of Nonlinear Partial Differential Equations

A large number of physical phenomena are modeled by nonlinear partial differential equations, subject to appropriate initial/ boundary conditions; these equations, in general, do not admit exact solution. The present monograph gives constructive mathematical techniques which bring out large time behavior of solutions of these model equations....

Making Systems Safer: Proceedings of the Eighteenth Safety-Critical Systems Symposium
Making Systems Safer: Proceedings of the Eighteenth Safety-Critical Systems Symposium

Making Systems Safer contains the papers presented at the eighteenth annual Safety-critical Systems Symposium, held at Bristol, UK, in February 2010.

The Symposium is for engineers, managers and academics in the field of system safety, across all industry sectors, so the papers making up this volume offer a wide-ranging coverage of...

Toward Equity in Quality in Mathematics Education
Toward Equity in Quality in Mathematics Education

Educational equity and quality are not only research issues which cut across different disciplines but are major determinants of socio-economic and human development in both industrial and developing countries. The status and role of mathematics, a subject which has long enjoyed a privileged status in school curricula worldwide due to its...

Mobilized Marketing and the Consumer: Technological Developments and Challenges
Mobilized Marketing and the Consumer: Technological Developments and Challenges

Mobilized Marketing and the Consumer: Technological Developments and Challenges explores technological developments and widespread issues concerning the explosion of mobile devices in the information age. Providing breakthrough research on topics such as Bluetooth, mobile phones, and online portals, this innovative publication...

Optimal Models and Methods with Fuzzy Quantities
Optimal Models and Methods with Fuzzy Quantities

The book contains ten chapters as follows, Prepare Knowledge, Regression and Self-regression Models with Fuzzy Coefficients; Regression and Self-regression Models with Fuzzy Variables, Fuzzy Input/output Model, Fuzzy Cluster Analysis and Fuzzy Recognition, Fuzzy Linear Programming, Fuzzy Geometric Programming, Fuzzy Relative Equation and Its...

Cyberdeterrence and Cyberwar
Cyberdeterrence and Cyberwar

This monograph presents the results of a fiscal year 2008 study, “Defining and Implementing Cyber Command and Cyber Warfare.” It discusses the use and limits of power in cyberspace, which has been likened to a medium of potential conflict, much as the air and space domains are. The study was conducted to help clarify and focus...

Digital Imagery and Informational Graphics in E-learning: Maximizing Visual Technologies
Digital Imagery and Informational Graphics in E-learning: Maximizing Visual Technologies

Digital Imagery and Informational Graphics in E-Learning: Maximizing Visual Technologies offers useful methods for creating digital imagery as well as leading pedagogical theories and research on the implementation of inherited images. This advanced publication features applied, hands-on strategies related to capturing and authoring...

Resource-Adaptive Cognitive Processes (Cognitive Technologies)
Resource-Adaptive Cognitive Processes (Cognitive Technologies)

This book investigates the adaptation of cognitive processes to limited resources. The central topics of this book are heuristics considered as results of the adaptation to resource limitations, through natural evolution in the case of humans, or through artificial construction in the case of computational systems; the construction and...

Result Page: 596 595 594 593 592 591 590 589 588 587 586 585 584 583 582 581 580 579 578 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy