Gjør som tusenvis av andre bokelskere
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.Du kan når som helst melde deg av våre nyhetsbrev.
This book provides you with a clear presentation of the theory of engineering graphics and the use of AutoCAD 2025 as they pertain to civil engineering applications. This combination of theory and its practical application will give you the knowledge and skills necessary to create designs that are accurate and easily understood by others.
While addressing different facets of knowledge production and innovation processes, in sum, the chapters in this book provide an overview of the relevant topics in contemporary research concerned with the global and regional dynamics in knowledge flows and innovation networks.This book was published as a special issue of European Plan
Group theory appears to be a promising source of hard computational problems for deploying new cryptographic constructions. This reference focuses on the specifics of using groups, including in particular non-Abelian groups, in the field of cryptography. It provides an introduction to cryptography with emphasis on the group theoretic perspective
This book provides fundamental notions of information and its consequences for information service success, business models and processes, and architecture and exploitation. These topics are essential for modern curricula of management, communication science and information systems, and for anyone in search of a foundational understanding of inf
Nothing is more synonymous with the twenty-first century than the image of a child on his or her smart phone, tablet, video game console, television, and/or laptop. But with all this external stimulation, has childhood development been helped or hindered?
This collection of case studies presents the latest interdisciplinary research and applications of games user research in determining and developing usability. Highlights include explorations of practical and ethical concerns in conducting usability testing with children, audio experiences in games, tangible and graphical game interfaces, contro
First realized in the 1980s by Lenstra, Lenstra, and Lovasz, the LLL algorithm was originally intended to factor polynomials with rational coefficients. It improved upon the existing lattice reduction algorithm in order to solve integer linear programming problems and was later adapted for use in crypanalysis. This book provides an introduction
Based on more than 10 years of the author's experience in the area, this book targets researchers and graduate students who would like to learn how to design and implement parallel direct solvers for mesh-based computations. It presents an alternative way of constructing multi-frontal direct solver algorithms for mesh-based computations. The con
This book equips readers with an access control logic they can use to specify and verify their security designs. Throughout the text, the authors use a single access control logic based on a simple propositional modal logic. The first part of the book presents the syntax and semantics of access control logic, basic access control concepts, and a
The book is a collection of research surveys in discrete mathematics written by leading experts.The sections of the book include: Extremal graphtheory and random graphs; Graph coloring and structural graph theory; Algorithms; Designs, Geometry, Packing and Covering; Combinatorial matrix theory;Cryptology and coding theory, Enumeration.
General purpose graphics processing units (GPGPUs) enable researchers in a variety of fields to benefit from the computational power of all the cores available inside graphics cards. This book shows you how to use GPUs for applications in diverse scientific fields, from physics and mathematics to computer science. The book explains the methods n
With contributions from some of the top in silico modeling groups in the United States and Europe, Multiscale Cancer Modeling discusses the scientific and technical expertise necessary to conduct innovative cancer modeling research across scales. It presents modeling methods and results at the forefront of cancer simula
This bestselling, classic textbook continues to provide a complete one-semester introduction to mathematical logic. The sixth edition incorporates recent work on Gödel's second incompleteness theorem as well as an appendix on consistency proofs for first-order arithmetic. It also offers historical perspectives and many new exercises of varying d
Focusing on a very active area of mathematical research in the last decade, this book presents methods used in the combinatorics of pattern avoidance and pattern enumeration in set partitions. Each chapter gives historical perspectives, contrasts different approaches, and illustrates methods and definitions with worked examples and Maple(TM) code.
Reflecting many of the recent advances and trends in this area, this classroom-tested text covers the core topics in discrete structures as outlined by the ACM and explores an assortment of novel applications, including simulations, genetic algorithms, network flows, probabilistic primality tests, public key cryptography, and coding theory. It p
This book explores the synergy between VLSI and Machine Learning and its applications across various domains. It will investigate how Machine Learning techniques can enhance the design and testing of VLSI circuits, improve power efficiency, optimize layouts, and enable novel architectures.
Securing the Digital World: A Comprehensive Guide to Multimedia Security is indispensable reading in today's digital age. With the outbreak of digital range and ever-evolving cyber threats, the demand to protect multimedia data has never been more imperative.
This book provides applications of machine learning in healthcare systems and seeks to close the gap between engineering and medicine by combining design and problem-solving skills of engineering with health sciences to advance healthcare treatment.
This book offers an accessible and comprehensive introduction to relationship marketing in franchising and retailing, especially in areas such as business and marketing management as well as strategic marketing. The chapters in this book were originally published as a special issue of Journal of Strategic Marketing.
This book offers a comprehensive introduction to seven commonly used image understanding techniques in modern information technology. Readers of various levels can find suitable techniques to solve their practical problems and discover the latest development in these specific domains.
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.