News

Specialists in the technical components of a synchrotron light source are usually well versed in their field and in the associated technical literature. However, with the rapid and continuing growth ...
The study and application of N-body problems has had an important role in the history of mathematics. In recent years, the availability of modern computer technology has added to their significance, ...
The formation of an alluvial clay deposit normally goes through sedimentation and consolidation. While the bottom portion is undergoing self-weight consolidation, sedimentation continues to take place ...
This book provides a broad introduction to the physics and technology of the High Luminosity Large Hadron Collider (HL-LHC). This new configuration of the LHC is one of the major accelerator projects ...
School of Civil Engineering and Architecture, Wuhan Institute of Technology, Wuhan, Hubei 430073, P. R. China Hubei Provincial Engineering Research Center for Green Civil Engineering Materials and ...
Physics Department, Illinois Institute of Technology, Chicago, IL 60616, U.S.A. Institute for Theoretical Physics, State University of New York, Stony Brook, NY 11794 ...
This book reports recent major advances in automated reasoning in geometry. The authors have developed a method and implemented a computer program which, for the first time, produces short and ...
The emerging technology of very inexpensive inertial sensors is available for navigation as never before. The book lays the analytical foundation for understanding and implementing the navigation ...
Cellular computing is a natural information processing paradigm, capable of modeling various biological, physical and social phenomena, as well as other kinds of complex adaptive systems. The ...
This third edition has been extended considerably to incorporate more information on instrument influences on the interpretation of X-ray scattering profiles and reciprocal space maps. Another ...
Secret sharing schemes form one of the most important topic in Cryptography. These protocols are used in many areas, applied mathematics, computer science, electrical engineering. A secret is divided ...