You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Extended Finite Element Method provides an introduction to the extended finite element method (XFEM), a novel computational method which has been proposed to solve complex crack propagation problems. The book helps readers understand the method and make effective use of the XFEM code and software plugins now available to model and simulate these complex problems. The book explores the governing equation behind XFEM, including level set method and enrichment shape function. The authors outline a new XFEM algorithm based on the continuum-based shell and consider numerous practical problems, including planar discontinuities, arbitrary crack propagation in shells and dynamic response in 3D composite materials. - Authored by an expert team from one of China's leading academic and research institutions - Offers complete coverage of XFEM, from fundamentals to applications, with numerous examples - Provides the understanding needed to effectively use the latest XFEM code and software tools to model and simulate dynamic crack problems
In the ever-evolving landscape of electromagnetic wave control, researchers face the pressing challenge of keeping pace with the rapid advancements in metasurface and metamaterial methods. As these technologies become increasingly integral to various engineering applications, educators and researchers seek a comprehensive resource that outlines the current state of the field and offers insights into its future prospects. Electromagnetic Wave Control Techniques of Metasurfaces and Metamaterials emerges as a timely solution, providing a detailed overview and a forward-looking perspective on wave control research using metasurfaces and metamaterials. With a firm focus on bridging the gap betwee...
This book constitutes the proceedings of the 12th International Conference on Information Security and Practice and Experience, ISPEC 2016, held in Zhangjiajie, China, in November 2016. The 25 papers presented in this volume were carefully reviewed and selected from 75 submissions. They cover multiple topics in information security, from technologies to systems and applications.
This book constitutes the proceedings of the 11th International Conference on Information Security Practice and Experience, ISPEC 2015, held in Beijing China, in May 2015. The 38 papers presented in this volume were carefully reviewed and selected from 117 submissions. The regular papers are organized in topical sections named: system security, stream cipher, analysis, key exchange protocol, elliptic curve cryptography, authentication, attribute-based encryption, mobile security, theory, implementation, privacy and indistinguishability.
It is a resource book that profiles the geography, demography, economy, political environment and business climates for each of China's 31 provinces. It will become a useful source book to researchers, businesses, government agencies, and news media interested in either the rapidly changing provincial economies or the Chinese economy as a whole.
This book constitutes the proceedings of the satellite workshops held around the 21st International Conference on Applied Cryptography and Network Security, ACNS 2023, held in Kyoto, Japan, in June 2023. The 34 full papers and 13 poster papers presented in this volume were carefully reviewed and selected from 76 submissions. They stem from the following workshops: · 1st ACNS Workshop on Automated Methods and Data-driven Techniques in Symmetric-key Cryptanalysis (ADSC 2023) · 5th ACNS Workshop on Application Intelligence and Blockchain Security (AIBlock 2023) · 4th ACNS Workshop on Artificial Intelligence in Hardware Security (AIHWS 2023) · 5th ACNS Workshop on Artificial Intelligence and Industrial IoT Security (AIoTS 2023) · 3rd ACNS Workshop on Critical Infrastructure and Manufacturing System Security (CIMSS 2023) · 5th ACNS Workshop on Cloud Security and Privacy (Cloud S&P 2023) · 4th ACNS Workshop on Secure Cryptographic Implementation (SCI 2023) · 4th ACNS Workshop on Security in Mobile Technologies (SecMT 2023) · 5th ACNS Workshop on Security in Machine Learning and its Applications (SiMLA 2023)
This thesis focuses on the manipulation of sound properties by artificial materials. It elaborates on the fundamental design of acoustic metasurfaces and metastructures as the extension of metamaterials, and their functionality in the manipulation of sound properties. A broad and comprehensive guideline of designing acoustic metasurfaces and metastructures is also provided. Based on the proposed subwavelength metasurfaces and the metastructures with a simplified layout, multiple potential applications are demonstrated. This thesis will appeal to acoustic engineers and researchers who are interested in designing acoustic artificial structures.
This book constitutes the proceedings of the 11th International Conference on Quantitative Evaluation of Systems, QEST 2014, held in Florence, Italy, in September 2014. The 24 full papers and 5 short papers included in this volume were carefully reviewed and selected from 61 submissions. They are organized in topical sections named: Kronecker and product form methods; hybrid systems; mean field/population analysis; models and tools; simulation; queueing, debugging and tools; process algebra and equivalences; automata and Markov process theory; applications, theory and tools; and probabilistic model checking.
This volume includes extended and revised versions of a set of selected papers from the International Conference on Electric and Electronics (EEIC 2011) , held on June 20-22 , 2011, which is jointly organized by Nanchang University, Springer, and IEEE IAS Nanchang Chapter. The objective of EEIC 2011 Volume 4 is to provide a major interdisciplinary forum for the presentation of new approaches from Communication Systems and Information Technology, to foster integration of the latest developments in scientific research. 137 related topic papers were selected into this volume. All the papers were reviewed by 2 program committee members and selected by the volume editor Prof. Ming Ma. We hope every participant can have a good opportunity to exchange their research ideas and results and to discuss the state of the art in the areas of the Communication Systems and Information Technology.