Despite the fact that Sophus Lie's theory was virtually the only systematic method for solving nonlinear ordinary differential equations (ODEs), it was rarely used for practical problems because of the massive amount of calculations involved.
A Practical Guide to Geometric Regulation for Distributed Parameter Systems provides an introduction to geometric control design methodologies for asymptotic tracking and disturbance rejection of infinite-dimensional systems.
Together with its compagnion volume this book presents a practical introduction to computing spline functions, the fundamental tools for fitting curves and surfaces in computer-aided design (CAD) and computer graphics.
Drawing from philosophy, information theory, and network science, Organized Skepticism in the Age of Misinformation: Surviving the Kingdom of Gossip offers a novel conceptual framework that views information as a form of gossip.
Covering both theory and progressive experiments, Quantum Computing: From Linear Algebra to Physical Realizations explains how and why superposition and entanglement provide the enormous computational power in quantum computing.
Artificial neural networks (ANN) can provide new insight into the study of composite materials and can normally be combined with other artificial intelligence tools such as expert system, genetic algorithm, and fuzzy logic.
Line Integral Methods for Conservative Problems explains the numerical solution of differential equations within the framework of geometric integration, a branch of numerical analysis that devises numerical methods able to reproduce (in the discrete solution) relevant geometric properties of the continuous vector field.
High Performance Computing: Programming and Applications presents techniques that address new performance issues in the programming of high performance computing (HPC) applications.
Information Technology and Career Education contains the contributions presented at the 2014 International Conference on Information Technology and Career Education (ICITCE 2014, Hong Kong, China, 9,10 October 2014).
In spite of their importance and potential societal impact, there is currently no comprehensive source of information about vehicular ad hoc networks (VANETs).
Digital computers have revolutionized computation and transformed how computers are used to control systems in real life, giving birth to real-time systems.
CI Techniques & Algorithms for a Variety of Medical Imaging SituationsDocuments recent advances and stimulates further researchA compilation of the latest trends in the field, Computational Intelligence in Medical Imaging: Techniques and Applications explores how intelligent computing can bring enormous benefit to existing technology in medical
Explores the Impact of the Analysis of Algorithms on Many Areas within and beyond Computer ScienceA flexible, interactive teaching format enhanced by a large selection of examples and exercisesDeveloped from the author's own graduate-level course, Methods in Algorithmic Analysis presents numerous theories, techniques, and methods used for analyzing algorithms.
Full of practical examples, Introduction to Scheduling presents the basic concepts and methods, fundamental results, and recent developments of scheduling theory.
Clearly, nature has been very effective in creating organisms that are capable of protecting themselves against a wide variety of pathogens such as bacteria, fungi, and parasites.
These proceedings of the symposium ISIT 2014 aim to be a platform for international exchange of the state-of-the-art research and practice in information technology.
Guide to Optimal Operational Risk and Basel II presents the key aspects of operational risk management that are also aligned with the Basel II requirements.
Commentaries by the editors to this comprehensive anthology in the area of physics-based vision put the papers in perspective and guide the reader to a thorough understanding of the basics of the field.
Professionals in the video and multimedia industries need a book that explains industry standards for video coding and how to convert the compressed information between standards.
New mathematical insights and rigorous results are often gained through extensive experimentation using numerical examples or graphical images and analyzing them.
The book provides a comprehensive discussion for utilizing computational models such as artificial neural networks, agent-based models, and decision field theory, for reliability engineering.
Understanding Python introduces the aspiring programmer to the concepts and skills of programming in Python, the most powerful, easy-to-read programming languages around.
The book not only provides empirical evidence of challenges faced by educators and learners during COVID-19 but also gives fresh insights on how educators and education administrators may act proactively to prepare for an emergency situation.
Management and IT professionals in the healthcare arena face the fear of the unknown: they fear that their massive efforts to comply with HIPAA requirements may not be enough, because they still do not know how compliance will be tested and measured.
Bringing together expert rhetorical theorists and technologists, this book explores our current understanding of, and attitudes toward, ethos, credibility, and trust in today's changing technological landscape.
This volume assembles hundreds of cases and studies to provide the most accurate and comprehensive picture of the status of pornography in the criminal justice system.
Demystify the world of artificial intelligence with this groundbreaking guide featuring over 100 innovative ways to incorporate AI into your daily life.