Gjør som tusenvis av andre bokelskere
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.Du kan når som helst melde deg av våre nyhetsbrev.
The book covers all basic ingredients of contact and computational contact mechanics, from efficient contact detection algorithms and classical optimization methods to new developments in contact kinematics and resolution schemes for both sequential and parallel computer architectures.
Since the concept was first proposed at the end of the 20th Century, metamaterials have been the subject of much research and discussion throughout the wave community. More than 10 years later, the number of related published articles is increasing significantly.
Optimization is generally a reduction operation of a definite quantity. This process naturally takes place in our environment and through our activities. For example, many natural systems evolve, in order to minimize their potential energy.
Decision-making has evolved recently thanks to the introduction of information and communication technologies in many organizations, which has led to new kinds of decision-making processes, called collaborative decision-making , at the organizational and cognitive levels.
The subject of consciousness has been widely investigated by philosophy, theology, biology, psychology, sociology, and more recently by cognitive sciences. This book reconciles these disciplines, focusing on the motivation of field of activity as a biological motor of a state of consciousness, and how system informatics can reveal its existence.
The use of 3D cameras and video-based modeling by the film industry have induced a booming of interest for 3D acquisition technology, 3D content, and 3D displays. 3D Video provides elements to understand the underlying computer-based science of these technologies, stepping away from traditional 3D vision.
Since the construction of the first embedded system in the 1960s, embedded systems have continued to spread. They provide a continually increasing number of services and are part of our daily life. The development of these systems is a difficult problem which does not yet have a global solution.
Communication services are evolving at an unprecedented rate. No longer limited to interpersonal vocal communication, they now integrate functions such as address books, content sharing and messaging. The emergence of social networks which may also include these features is an important element of this transformation.
Over the last few years vehicular networks have been receiving a lot of attention from academia, industry, standardization bodies, and the various transportation agencies and departments of many governments around the world.
This book focuses on the theoretical and practical design of reinforced concrete beams, columns, and frame structures. Its analytical approach for the design of normal reinforced concrete structural elements is compatible with most international design rules for reinforced concrete structures, including Europe's Eurocode 2.
Risk management deals with prevention, decision-making, action taking, crisis management and recovery, taking into account the consequences of unexpected events. The authors of this book are interested in ecological processes, human behavior, as well as the control and management of life-critical systems, which are potentially highly automated. Three main attributes define life-critical systems, i.e. safety, efficiency and comfort. They typically lead to complex and time-critical issues and can belong to domains such as transportation (trains, cars, aircraft), energy (nuclear, chemical engineering), health, telecommunications, manufacturing and services.The topics covered relate to risk management principles, methods and tools, and reliability assessment: human errors as well as system failures, socio-organizational issues of crisis occurrence and management, co-operative work including human-machine cooperation and CSCW (computer-supported cooperative work): task and function allocation, authority sharing, interactivity, situation awareness, networking and management evolution and lessons learned from Human-Centered Design.
This book provides guidance for companies on how to transition to high-performance industrial systems and agile networked enterprises based on the non-hierarchical network model better suited for today's dynamic global market over the traditional, often problematic, hierarchical networks.
An ideal resource for students, industrial engineers, and researchers, Signal Processing with Free Software Practical Experiments presents practical experiments in signal processing using free software.
This book concerns the use of dioid algebra as (max, +) algebra to treat the synchronization of tasks expressed by the maximum of the ends of the tasks conditioning the beginning of another task a criterion of linear programming.
A Constraint Satisfaction Problem (CSP) consists of a set of variables, a domain of values for each variable and a set of constraints. The objective is to assign a value for each variable such that all constraints are satisfied.
Blind identification consists of estimating a multi-dimensional system only through the use of its output, and source separation, the blind estimation of the inverse of the system. Estimation is generally carried out using different statistics of the output.
This remarkable work identifies and summarizes the main problems posed by the design of a man-machine dialogue system, then goes on to suggest a number of intriguing ideas that can be used to continue on the path to an efficient, realistic, and fluid communication between human beings and machines.
The focus of this book is risk assessment methodologies for network architecture design. The main goal is to present and illustrate an innovative risk propagation-based quantitative assessment tool.
This book explores the implementation of a method of mutually integrating the agile scrum method used by the developers with the user-centered design used by ergonomists. With this method, users are constantly intervening and thereby participating in the design process of a product, from looking for an idea through finalizing the developed product.
A review of the principles of the safety of software-based equipment, this book begins by presenting the definition principles of safety objectives.
Three-dimensional Separated Flows Topology develops concepts and a methodology for a rational description of the organization of three-dimensional flows, particularly in cases where the flow is the detachment place.
Since its inception, the Internet has evolved from a textual information system towards a multimedia information system, in which data, services and applications are consumed as content. Today, however, the main problem faced is that applications are now content-oriented but the protocol stack remains the same, based on the content location.
This book provides a description of the modeling, design, and calculation of the aeronautical qualities of airplanes and drones. Divided into several parts, this book first summarizes all the necessary theoretical developments about the equations of motions and trajectory calculations of the machine.
This practical guide arms scientists, researchers, and industrial engineers with state-of-the-art verification techniques for real time embedded systems based on the inverse method for parametric timed automata. The authors begin with an introduction to the inverse method, demonstrating how to use it to guarantee robustness in real-time systems.
We are currently witnessing an increase in telecommunications norms and standards given the recent advances in this field. The increasing number of normalized standards paves the way for an increase in the range of services available for each consumer. Moreover, the majority of available radio frequencies have already been allocated.
The last decade has witnessed an unprecedented development and growth in global wireless communications systems, technologies and network traffic generated over network infrastructures.
This book addresses the multiple technical aspects of the distribution of synchronization in new generation telecommunication networks, focusing in particular on synchronous Ethernet and IEEE1588 technologies.
This third book of a 3-volume set on Fracture Mechanics adds a pragmatic and supportive character to the previous volumes by focusing on case studies using corrected exercises that teachers, students or engineers will find extremely useful.
Focusing on reliability issues, this second volume in the comprehensive series on fracture mechanics rounds off the first volume through the analysis of adjustment tests used to validate the use of the laws conforming to the behavior of the materials and structures under study.
This first book of a 3-volume set on Fracture Mechanics is mainly centered on the vast range of the laws of statistical distributions encountered in various scientific and technical fields.
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.