Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Loading
Guided Self-Organization: Inception (Emergence, Complexity and Computation)
Guided Self-Organization: Inception (Emergence, Complexity and Computation)

Is it possible to guide the process of self-organisation towards specific patterns and outcomes? Wouldn’t this be self-contradictory? After all, a self-organising process assumes a transition into a more organised form, or towards a more structured functionality, in the absence of centralised control. Then...

Understanding Petri Nets: Modeling Techniques, Analysis Methods, Case Studies
Understanding Petri Nets: Modeling Techniques, Analysis Methods, Case Studies

With their intuitive graphical approach and expressive analysis techniques, Petri nets are suitable for a wide range of applications and teaching scenarios, and they have gained wide acceptance as a modeling technique in areas such as software design and control engineering. The core theoretical principles have been studied for many decades...

Nanoscale Sensors (Lecture Notes in Nanoscale Science and Technology)
Nanoscale Sensors (Lecture Notes in Nanoscale Science and Technology)

This book is a comprehensive introduction to nanoscale materials for sensor applications, with a focus on connecting the fundamental laws of physics and the chemistry of materials with device design. Nanoscale sensors can be used for a wide variety of applications, including the detection of gases, optical signals, and mechanical strain, and...

Handbook on the History of Mathematics Education
Handbook on the History of Mathematics Education

This is the first comprehensive International Handbook on the History of Mathematics Education, covering a wide spectrum of epochs and civilizations, countries and cultures. Until now, much of the research into the rich and varied history of mathematics education has remained inaccessible to the vast majority of scholars, not least...

Quantum Attacks on Public-Key Cryptosystems
Quantum Attacks on Public-Key Cryptosystems

The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no...

Internet Addiction: Neuroscientific Approaches and Therapeutical Interventions (Studies in Neuroscience, Psychology and Behavioral Economics)
Internet Addiction: Neuroscientific Approaches and Therapeutical Interventions (Studies in Neuroscience, Psychology and Behavioral Economics)

This book combines a scholarly introduction with state-of-the-art research in the characterization of Internet addiction. It is intended for a broad audience including scientists, students and practitioners. The first part of the book contains an introduction to Internet addiction and their pathogenesis. The second part of the book is...

Principles of Musical Acoustics (Undergraduate Lecture Notes in Physics)
Principles of Musical Acoustics (Undergraduate Lecture Notes in Physics)

Principles of Musical Acoustics focuses on the basic principles in the science and technology of music. Musical examples and specific musical instruments demonstrate the principles. The book begins with a study of vibrations and waves, in that order. These topics constitute the basic physical properties of sound, one of two pillars supporting...

Artificial Cognition Architectures
Artificial Cognition Architectures

The goal of this book is to establish the foundation, principles, theory, and concepts that are the backbone of real, autonomous Artificial Intelligence. Presented here are some basic human intelligence concepts framed for Artificial Intelligence systems. These include concepts like Metacognition and Metamemory, along with architectural...

Failure Analysis: Fundamentals and Applications in Mechanical Components
Failure Analysis: Fundamentals and Applications in Mechanical Components

This book addresses the failures of structural elements, i.e. those components whose primary mission is to withstand mechanical loads. The book is intended as a self-contained source for those with different technical grades, engineers and scientists but also technicians in the field can benefit from its reading.

...
Security-aware Cooperation in Cognitive Radio Networks (SpringerBriefs in Computer Science)
Security-aware Cooperation in Cognitive Radio Networks (SpringerBriefs in Computer Science)

This brief investigates spectrum efficient and energy efficient strategies, known as cognitive radio networks (CRNs), to ensure secure cooperation between licensed and unlicensed users. The authors address issues of spectrum scarcity, spectrum sensing, transmission performance, trust-aware cooperation, and secure communications. Two...

Counterfeit Integrated Circuits: Detection and Avoidance
Counterfeit Integrated Circuits: Detection and Avoidance

This timely and exhaustive study offers a much-needed examination of the scope and consequences of the electronic counterfeit trade.  The authors describe a variety of shortcomings and vulnerabilities in the electronic component supply chain, which can result in counterfeit integrated circuits (ICs).  Not only does this book provide...

Analysis of Engineering Drawings and Raster Map Images
Analysis of Engineering Drawings and Raster Map Images

This book covers up-to-date methods and algorithms for the automated analysis of engineering drawings and digital cartographic maps. The Non-Deterministic Agent System (NDAS) offers a parallel computational approach to such image analysis. The book describes techniques suitable for persistent and explicit knowledge representation for...

Result Page: 327 326 325 324 323 322 321 320 319 318 
©2016 LearnIT (support@pdfchm.net) - Privacy Policy