Mostrando 6,981 - 7,000 Resultados de 11,577 Para Buscar '"Adaptation"', tiempo de consulta: 0.14s Limitar resultados
  1. 6981
    Publicado 2003
    Tabla de Contenidos: “…Programming model -- 4.1 Overview -- 4.2 WebSphere Commerce Server framework -- 4.2.1 Servlet engine -- 4.2.2 Protocol Listeners -- 4.2.3 Adapter manager -- 4.2.4 Adapters -- 4.2.5 Web controller -- 4.2.6 Commands -- 4.2.7 Entity beans -- 4.2.8 Data beans -- 4.2.9 Data Bean Manager -- 4.2.10 JavaServer Page (JSP) templates -- 4.2.11 WebSphere Commerce &lt -- instance&gt -- .xml configuration file -- 4.3 Application flow of an HTTP request -- 4.4 Design patterns -- 4.4.1 Model-view-controller design pattern -- 4.4.2 Command design pattern -- 4.4.3 Display design pattern -- 4.5 Persistent object model -- 4.6 Access control -- 4.7 Customizing application assets -- 4.7.1 Asset types to customize and development tooling -- 4.7.2 Matching skills to customization needs -- 4.8 For more information -- Chapter 5. …”
    Libro electrónico
  2. 6982
    Publicado 2003
    Tabla de Contenidos: “…Prerequisite steps -- Configuring the Service Tools adapter on the iSeries server -- Setting up Management Central -- Appendix B. …”
    Libro electrónico
  3. 6983
    por Chiueh, Tzi-Dar, 1960-
    Publicado 2012
    Tabla de Contenidos: “…Digital Modulation 17 -- 2.1 Single-Carrier Modulation 17 -- 2.1.1 Power Spectral Densities of Modulation Signals 18 -- 2.1.2 PSK, QAM, and ASK 19 -- 2.1.3 CPFSK and MSK 22 -- 2.1.4 Pulse Shaping and Windowing 23 -- 2.2 Multi-Carrier Modulation 24 -- 2.2.1 Orthogonal Frequency-Division Multiplexing 27 -- 2.2.2 OFDM Related Issues 27 -- 2.2.3 OFDM Transceiver Architecture 31 -- 2.3 Adaptive OFDM 33 -- Summary 37 -- References 37 -- 3. …”
    Libro electrónico
  4. 6984
    por Putte, Geert van de
    Publicado 2005
    Tabla de Contenidos: “…18.8.1 Configuring the Cluster IP address on the Network Adapter…”
    Libro electrónico
  5. 6985
    Publicado 2023
    Tabla de Contenidos: “…Network Segment -- 4.3.4.5.2 From Segment to Resource -- 4.3.4.5.3 From Resource to Access Attempt -- 4.3.4.5.4 Recap of the Assume Breach Component -- 4.4 Priorities for Modernizing Identity -- 4.4.1 Priority 1: Unify Identity Management -- 4.4.1.1 Control 1.1: Enable Single Sign-On -- 4.4.1.2 Control 1.2: External Identities -- 4.4.1.3 Control 1.3: Enable Passwordless Approach When Possible -- 4.4.1.4 Control 1.4: Automatic Provisioning -- 4.4.1.5 Control 1.5: Device Integration -- 4.4.1.6 Control 1.6: Managed Identities -- 4.4.2 Priority 2: Implement Secure Adaptive Access -- 4.4.2.1 Control 2.1: Secure Adaptive Authentication -- 4.4.2.2 Control 2.2: Block Legacy Authentication -- 4.4.2.3 Control 2.3: Protect Against Consent Phishing -- 4.4.2.4 Control 2.4: Equal Focus on On-Prem Identity…”
    Libro electrónico
  6. 6986
    por Brühlmann, Thomas
    Publicado 2023
    Tabla de Contenidos: “…7.2 7-Segment-Anzeigen -- 7.2.1 Port Expander über den I2C-Bus -- 7.3 LC-Display (LCD) -- 7.3.1 Paralleles LC-Display -- 7.3.2 Serielle LC-Displays -- 7.4 LC-Display Nokia 3310/5110 -- 7.5 OLED-Display -- 7.6 LED-Matrix -- 7.7 Projekt Geschwindigkeitsmesser fürs Fahrrad -- 7.8 Projekt Schrittzähler -- Kapitel 8: Datenverarbeitung -- 8.1 Daten speichern -- 8.1.1 Daten im Microcontroller speichern -- 8.1.2 Daten in externem EEPROM ablegen -- 8.1.3 Daten auf SD-Karte speichern -- 8.2 Daten ins Internet senden -- 8.3 Projekt: Programmierbarer Signalgeber -- 8.4 Sinusgenerator -- 8.5 Projekt Sollwerteingabe mit Drehgeber -- 8.5.1 Projekt-Erweiterung - Ausgabe als Analogwert -- Kapitel 9: Erweiterungen -- 9.1 Bibliotheken -- 9.1.1 Ethernet-Bibliothek -- 9.1.2 Wire-Bibliothek -- 9.1.3 SoftwareSerial -- 9.1.4 TinyGPS-Bibliothek -- 9.1.5 PString-Bibliothek -- 9.1.6 TextFinder-Bibliothek -- 9.1.7 JeeLib (nur Arduino UNO R3) -- 9.1.8 Stepper-Bibliothek -- 9.1.9 Wii Nunchuk -- 9.2 Hardware-Erweiterungen (Shields) -- 9.2.1 Protoshield -- 9.2.2 Protonly-Protoshield -- 9.2.3 Floweronly-Protoshield -- 9.2.4 Ethernet Shield -- 9.2.5 Datalogger und GPS Shield -- 9.2.6 Adafruit Motor Shield -- 9.2.7 DFRobot Motor Shield -- 9.2.8 Wave Shield -- 9.2.9 SD Card Shield -- 9.2.10 Lithium Backpack -- 9.2.11 ITEAD Power Shield -- 9.2.12 RFM12B Shield -- 9.2.13 Schraubklemmen-Shield -- 9.3 Hardware-Adapter -- 9.3.1 RFM12B-Breakout-Board -- 9.3.2 Wii-Nunchuk-Adapter -- Kapitel 10: Arduino im Einsatz -- 10.1 Verbindung zum Internet -- 10.1.1 Kabelgebundene Netzwerkverbindung -- 10.1.2 Arduino als Webserver -- 10.1.3 Der Arduino als Webclient -- 10.2 Verbindung zum Internet -- 10.2.1 Wifi mit UNO R4 WIFI (nur Arduino UNO R4 WIFI) -- 10.2.2 Wifi-Anwendungen mit UNO R4 WIFI -- 10.3 ESP-Module und Arduino -- 10.3.1 Integration in Arduino -- 10.3.2 ESP8266 -- 10.3.3 ESP8266-ESP12E…”
    Libro electrónico
  7. 6987
    Publicado 2024
    Tabla de Contenidos: “…Front Cover -- Federated Learning -- Copyright -- Contents -- Contributors -- Preface -- 1 Optimization fundamentals for secure federated learning -- 1 Gradient descent-type methods -- 1.1 Introduction -- 1.2 Basic components of GD-type methods -- 1.2.1 Search direction -- 1.2.2 Step-size -- 1.2.3 Proximal operator -- 1.2.4 Momentum -- 1.2.5 Dual averaging variant -- 1.2.6 Structure assumptions -- 1.2.7 Optimality certification -- 1.2.8 Unified convergence analysis -- 1.2.9 Convergence rates and complexity analysis -- 1.2.10 Initial point, warm-start, and restart -- 1.3 Stochastic gradient descent methods -- 1.3.1 The algorithmic template -- 1.3.2 SGD estimators -- 1.3.3 Unified convergence analysis -- 1.4 Concluding remarks -- Acknowledgments -- References -- 2 Considerations on the theory of training models with differential privacy -- 2.1 Introduction -- 2.2 Differential private SGD (DP-SGD) -- 2.2.1 Clipping -- 2.2.2 Mini-batch SGD -- 2.2.3 Gaussian noise -- 2.2.4 Aggregation at the server -- 2.2.5 Interrupt service routine -- 2.2.6 DP principles and utility -- 2.2.7 Normalization -- 2.3 Differential privacy -- 2.3.1 Characteristics of a differential privacy measure -- 2.3.2 (ε,δ)-differential privacy -- 2.3.3 Divergence-based DP measures -- 2.4 Gaussian differential privacy -- 2.4.1 Gaussian DP -- 2.4.2 Subsampling -- 2.4.3 Composition -- 2.4.4 Tight analysis of DP-SGD -- 2.4.5 Strong adversarial model -- 2.4.6 Group privacy -- 2.4.7 DP-SGD's trade-off function -- 2.5 Future work -- 2.5.1 Using synthetic data -- 2.5.2 Adaptive strategies -- 2.5.3 DP proof: a weaker adversarial model -- 2.5.4 Computing environment with less adversarial capabilities -- References -- 3 Privacy-preserving federated learning: algorithms and guarantees -- 3.1 Introduction -- 3.2 Background and preliminaries -- 3.2.1 The FedAvg algorithm…”
    Libro electrónico
  8. 6988
    Publicado 2025
    Tabla de Contenidos: “…10.3 UHIs and Global Warming -- 10.4 Causes of UHIs -- 10.4.1 Thermal Capacity and Urban Geometry -- 10.4.2 Sky View Factor (SVF) -- 10.4.3 Albedo and Effective Albedo -- 10.4.4 Bowen Ratio -- 10.4.5 Anthropogenic Heat -- 10.5 Techniques to Measure Controlling Factors of UHIs -- 10.6 Impact of UHIs -- 10.6.1 Impact of UHIs on Local Climate -- 10.6.2 Impact of UHIs on Ambient Temperature -- 10.6.3 Impact of UHIs on Pollution -- 10.6.4 Impact of UHIs on Photochemistry -- 10.6.5 Energy Impact of UHIs -- 10.6.6 Energy Impact of UHIs on Local Climate Change -- 10.6.7 Impact UHI, Health, Comfort, and Economy -- 10.7 Mitigating the Urban Heat Island -- 10.7.1 Development of Reflective Materials -- 10.7.2 Development of Cool Roof Technologies -- 10.7.3 Development of Cool Pavement Technologies -- 10.7.4 Greening the Urban Environment, the Impact of Trees in the City -- 10.7.5 Actual Development of Green Roof Technologies -- 10.7.6 Mitigation of UHI Effects to Save Energy -- 10.7.7 Other Mitigation Technologies -- 10.8 Conclusions -- References -- Chapter 11 Well-Being, Thermal Comfort, and Environmental Liveability: Adaptation Studies -- 11.1 Introduction -- 11.2 Thermal Comfort -- 11.2.1 Metabolism -- 11.2.2 Neutral Condition -- 11.3 Heat Balance Equation for a Human Body -- 11.4 Thermoregulatory System -- 11.4.1 Case 1. …”
    Libro electrónico
  9. 6989
    Publicado 2022
    Tabla de Contenidos: “…12 IoT-Based Bias Analysis in Acoustic Feedback Using Time-Variant Adaptive Algorithm in Hearing Aids…”
    Libro electrónico
  10. 6990
    “…Une réglementation et des formalités administratives de piètre qualité ont un coût pour les économies nationales : la capacité de croissance de ces dernières, leur compétitivité, leur capacité d’adaptation et leur aptitude à créer des emplois peuvent en pâtir. …”
    Libro electrónico
  11. 6991
    Publicado 2015
    Tabla de Contenidos: “…Calabrese,Guillaume Monghal, Mohammad Anas, Luis Maestro, Juha Kallio and Olli Ramula -- 13.1 Introduction 417 -- 13.2 Architecture 418 -- 13.3 Elements 419 -- 13.4 Evolved Universal Terrestrial Radio Access Network 422 -- 13.5 Interfaces 428 -- 13.6 Protocol Stacks 430 -- 13.7 Layer 2 Structure 434 -- 13.8 LTE Radio Network 435 -- 13.9 LTE Spectrum 436 -- 13.10 Physical Layer 438 -- 13.11 SC-FDM and SC-FDMA 448 -- 13.12 Frame Structure and Physical Channels 449 -- 13.13 Physical Layer Procedures 453 -- 13.14 User Mobility 455 -- 13.15 Radio Resource Management Procedures 457 -- 13.16 Link Adaptation 458 -- 13.17 ICIC 459 -- 13.18 Reporting 463 -- 13.19 LTE Radio Resource Management 466 -- 13.20 RRM Principles and Algorithms Common to UL and DL 467 -- 13.21 Uplink RRM 477 -- 13.22 Downlink RRM 482 -- 13.23 Intra-LTE Handover 485 -- 13.24 LTE Release 8/9 Features 487 -- 13.25 LTE-Advanced Features (Rel. 10) 496 -- 13.26 LTE Transport and Core Network 504 -- 13.27 Transport Network 506 -- 13.28 Core Network 509 -- 13.29 Charging 510 -- References 513 -- 14 Wireless LAN and Evolution 515 /Jyrki T. …”
    Libro electrónico
  12. 6992
    Tabla de Contenidos: “…Renforcement des instruments d'évaluation visant à garantir une adaptation des cadr... -- Graphique 4. Les principes directeurs concernant l'information, la consultation et la participat... -- 4.2. …”
    Libro electrónico
  13. 6993
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Dedication Page -- Contents -- Section I Cyber Operations Introduction -- I.1 Phases of Cyber Operations -- I.1.1 1980s-2002 -- I.1.2 2003-2012 -- I.1.3 2013-present -- Chapter 1 Cyber Operations -- 1.1 Cyber Operations Introduction -- 1.1.1 Cyber - A 21st-Century Collection Channel -- 1.1.2 Hackers - Pre-Cyber Operations -- 1.1.3 Cyber and Counter-Terror/Insurgency -- 1.2 Early Internet and Cyber Operations -- 1.2.1 Maturing of Cyber Operations - ISIS and Russia -- 1.2.2 ISIS Cyber Operations -- 1.2.3 Russian Cyber Operations -- 1.3 Cyber Operations' Stage Descriptions -- 1.3.1 Stage I (late 1990s-~2010)(Community Development) -- 1.3.2 Stage II (~2010-~2015)(Tactical) -- 1.3.3 Stage III (~2015 to present)(Tactical and Strategic) -- 1.4 Cyber Operations Wrap-up -- Bibliography -- Chapter 2 ISIS and Web-Based Insurgency -- 2.1 Introduction -- 2.1.1 Terrorist Development of the Internet for Messaging -- 2.1.2 ISIS Adaptation of the Internet for Coordination, Command and Control (C2) -- 2.1.3 ISIS "Emergence" from Cyberspace to form a State -- 2.2 Cyber-Based Irregular Operations -- 2.2.1 Three-Phase Insurgency Model with Cyber - ISIS Example -- 2.2.2 ISIS Insurgency Phases -- 2.2.3 Counter-ISIS Operations in Cyber -- 2.3 ISIS and Web-Based Insurgency Wrap-up -- Bibliography -- Chapter 3 Cyber and Crime -- 3.1 Cyber and Crime -- 3.1.1 Cybercrime Definitions -- 3.1.2 Crimes Against Individuals -- 3.1.2.1 Cyber-Fraud Reporting -- 3.1.2.2 Spam -- 3.1.2.3 Phishing -- 3.1.3 Crimes Against Organizations -- 3.1.3.1 Telephony Phishing -- 3.1.3.2 Ransomware Introduction -- 3.1.3.3 Ransomware Tools Background -- 3.1.3.4 Ransomware as a Service -- 3.1.3.5 Cryptocurrency -- 3.1.4 Cyber Gangs - Membership Analogy to Organized Crime -- 3.1.5 Cybercrime Wrap-Up -- Bibliography -- Chapter 4 Nation-State Cyber Operations…”
    Libro electrónico
  14. 6994
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Table of Contents -- About the Authors -- Foreword -- Preface -- Acknowledgements -- Prologue -- Chapter 1 Introduction -- 1.1 AI Factory -- 1.1.1 Artificial Intelligence -- 1.1.2 Industrial Automation -- 1.1.3 Engineering Knowledge -- 1.1.4 System Understanding -- 1.1.5 Context Adaptation -- 1.1.6 Connectivity -- 1.1.7 Information Logistics -- 1.1.8 In Summary -- 1.2 Artificial Intelligence-Empowered Analytics -- 1.3 AI Revolution in Industry -- 1.3.1 The AI Revolution is Happening Now -- 1.3.1.1 Healthcare -- 1.3.1.2 Education -- 1.3.1.3 Banking, Financial Services and Insurance (BFSI) -- 1.3.1.4 Retail and e-Commerce -- 1.3.1.5 Gaming and Entertainment -- 1.3.2 The Road to Superintelligence -- 1.4 AI Winter, AI Spring -- 1.4.1 The First AI Spring -- 1.4.2 The First AI Winter -- 1.4.3 The Second AI Spring -- 1.4.4 The Second AI Winter -- 1.4.5 Another Spring: The DL Revolution -- 1.4.6 Predictions of Another AI Winter -- 1.4.7 Surviving the Next AI Winter: From Myths to Realities -- 1.5 The Value of AI -- 1.5.1 Challenges of AI -- 1.6 Power of AI vs. …”
    Libro electrónico
  15. 6995
    Publicado 2020
    Tabla de Contenidos: “…Solar cookstoves for adaptation to degrading natural conditions / Claude Henry -- 37. …”
    Libro electrónico
  16. 6996
    Publicado 2018
    Tabla de Contenidos: “…Snowball stemming -- Lancaster stemming -- Lovins stemming -- Dawson stemming -- Lemmatization -- N-grams -- Feature extraction -- One hot encoding -- TF-IDF -- CountVectorizer -- Word2Vec -- CBOW -- Skip-Gram model -- Applying NLP techniques -- Text classification -- Introduction to Naive Bayes' algorithm -- Random Forest -- Naive Bayes' text classification code example -- Implementing sentiment analysis -- Frequently asked questions -- Summary -- Chapter 7: Fuzzy Systems -- Fuzzy logic fundamentals -- Fuzzy sets and membership functions -- Attributes and notations of crisp sets -- Operations on crisp sets -- Properties of crisp sets -- Fuzzification -- Defuzzification -- Defuzzification methods -- Fuzzy inference -- ANFIS network -- Adaptive network -- ANFIS architecture and hybrid learning algorithm -- Fuzzy C-means clustering -- NEFCLASS -- Frequently asked questions -- Summary -- Chapter 8: Genetic Programming -- Genetic algorithms structure -- KEEL framework -- Encog machine learning framework -- Encog development environment setup -- Encog API structure -- Introduction to the Weka framework -- Weka Explorer features -- Preprocess -- Classify -- Attribute search with genetic algorithms in Weka -- Frequently asked questions -- Summary -- Chapter 9: Swarm Intelligence -- Swarm intelligence -- Self-organization -- Stigmergy -- Division of labor -- Advantages of collective intelligent systems -- Design principles for developing SI systems -- The particle swarm optimization model -- PSO implementation considerations -- Ant colony optimization model -- MASON Library -- MASON Layered Architecture -- Opt4J library -- Applications in big data analytics -- Handling dynamical data -- Multi-objective optimization -- Frequently asked questions -- Summary -- Chapter 10: Reinforcement Learning -- Reinforcement learning algorithms concept…”
    Libro electrónico
  17. 6997
    Publicado 2021
    Tabla de Contenidos: “…The Cuchiero-Klein-Teichmann approach -- 6.2.2. Adapting Cuchiero-Klein-Teichmann's results to our objective -- 6.3. …”
    Libro electrónico
  18. 6998
    Publicado 2021
    Tabla de Contenidos: “…<P><b>1 Introductory Concepts and Calculus Review 1</b></p> <p>1.1 Basic Tools of Calculus 1</p> <p>1.2 Error, Approximate Equality, and Asymptotic Order Notation 10</p> <p>1.3 A Primer on Computer Arithmetic 13</p> <p>1.4 A Word on Computer Languages and Software 17</p> <p>1.5 A Brief History of Scientific Computing 18</p> <p><b>2 A Survey of Simple Methods and Tools 19</b></p> <p>2.1 Horner's Rule and Nested Multiplication 19</p> <p>2.2 Difference Approximations to the Derivative 22</p> <p>2.3 Application: Euler's Method for Initial Value Problems 30</p> <p>2.4 Linear Interpolation 34</p> <p>2.5 Application-The Trapezoid Rule 38</p> <p>2.6 Solution of Tridiagonal Linear Systems 46</p> <p>2.7 Application: Simple Two-Point Boundary Value Problems 50</p> <p><b>3 Root-Finding 55</b></p> <p>3.1 The Bisection Method 55</p> <p>3.2 Newton's Method: Derivation and Examples 59</p> <p>3.3 How to Stop Newton's Method 63</p> <p>3.4 Application: Division Using Newton's Method 66</p> <p>3.5 The Newton Error Formula 69</p> <p>3.6 Newton's Method: Theory and Convergence 72</p> <p>3.7 Application: Computation of the Square Root 76</p> <p>3.8 The Secant Method: Derivation and Examples 79</p> <p>3.9 Fixed Point Iteration 83</p> <p>3.10 Roots of Polynomials (Part 1) 85</p> <p>3.11 Special Topics in Root-finding Methods 88</p> <p>3.12 Very High-order Methods and the Efficiency Index 98</p> <p><b>4 Interpolation and Approximation 101</b></p> <p>4.1 Lagrange Interpolation 101</p> <p>4.2 Newton Interpolation and Divided Differences 104</p> <p>4.3 Interpolation Error 114</p> <p>4.4 Application: Muller's Method and Inverse Quadratic Interpolation 119</p> <p>4.5 Application: More Approximations to the Derivative 121</p> <p>4.6 Hermite Interpolation 122</p> <p>4.7 Piecewise Polynomial Interpolation 125</p> <p>4.8 An Introduction to Splines 129</p> <p>4.9 Tension Splines 135</p> <p>4.10 Least Squares Concepts in Approximation 137</p> <p>4.11 Advanced Topics in Interpolation Error 142</p> <p><b>5 Numerical Integration 149</b></p> <p>5.1 A Review of the Definite Integral 149</p> <p>5.2 Improving the Trapezoid Rule 151</p> <p>5.3 Simpson's Rule and Degree of Precision 154</p> <p>5.4 The Midpoint Rule 162</p> <p>5.5 Application: Stirling's Formula 166</p> <p>5.6 Gaussian Quadrature 167</p> <p>5.7 Extrapolation Methods 173</p> <p>5.8 Special Topics in Numerical Integration 177</p> <p><b>6 Numerical Methods for Ordinary Differential Equations 185</b></p> <p>6.1 The Initial Value Problem-Background 185</p> <p>6.2 Euler's Method 187</p> <p>6.3 Analysis of Euler's Method 189</p> <p>6.4 Variants of Euler's Method 190</p> <p>6.5 Single Step Methods-Runge-Kutta 197</p> <p>6.6 Multistep Methods 200</p> <p>6.7 Stability Issues 204</p> <p>6.8 Application to Systems of Equations 206</p> <p>6.9 Adaptive Solvers 210</p> <p>6.10 Boundary Value Problems 212</p> <p><b>7 Numerical Methods for the Solution of Systems of Equations 217</b></p> <p>7.1 Linear Algebra Review 217</p> <p>7.2 Linear Systems and Gaussian Elimination 218</p> <p>7.3 Operation Counts 223</p> <p>7.4 The <i>LU </i>Factorization 224</p> <p>7.5 Perturbation, Conditioning and Stability 229</p> <p>7.6 SPD Matrices and the Cholesky Decomposition 235</p> <p>7.7 Application: Numerical Solution of Linear Least Squares Problems 236</p> <p>7.8 Sparse and Structured Matrices 240</p> <p>7.9 Iterative Methods for Linear Systems -- A Brief Survey 241</p> <p>7.10 Nonlinear Systems: Newton's Method and Related Ideas 242</p> <p>7.11 Application: Numerical Solution of Nonlinear BVP's 244</p> <p><b>8 Approximate Solution of the Algebraic Eigenvalue Problem 247</b></p> <p>8.1 Eigenvalue Review 247</p> <p>8.2 Reduction to Hessenberg Form 249</p> <p>8.3 Power Methods 250</p> <p>8.4 Bisection and Inertia to Compute Eigenvalues of Symmetric Matrices 253</p> <p>8.5 An Overview of the <i>QR </i>Iteration 257</p> <p>8.6 Application: Roots of Polynomials, II 260</p> <p>8.7 Application: Computation of Gaussian Quadrature Rules 261</p> <p><b>9 A Survey of Numerical Methods for Partial Differential Equations 265</b></p> <p>9.1 Difference Methods for the Diffusion Equation 265</p> <p>9.2 Finite Element Methods for the Diffusion Equation 270</p> <p>9.3 Difference Methods for Poisson Equations 271</p> <p><b>10 An Introduction to Spectral Methods 277</b></p> <p>10.1 Spectral Methods for Two-Point Boundary Value Problems 277</p> <p>10.2 Spectral Methods in Two Dimensions 279</p> <p>10.3 Spectral Methods for Time-Dependent Problems 282</p> <p>10.4 Clenshaw-Curtis Quadrature 283</p>…”
    Libro electrónico
  19. 6999
    por OECD
    Publicado 2019
    Tabla de Contenidos:
    Libro electrónico
  20. 7000
    Tabla de Contenidos: “…Évaluation, révision et adaptation -- Notes -- 8. Approches volontaires et systèmes de permis négociables -- 8.1. …”
    Libro electrónico