Computational fluid dynamics (CFD) is the main field of computational mechanics that has historically benefited from advances in high-performance computing. High-performance computing involves several techniques to make a simulation efficient and…
This This book is open access under a CC BY 4.0 license. This book offers a comprehensive guide, covering every important aspect of computational thinking education. It provides an in-depth discussion of computational thinking, including the notion…
"This book lays out much of what we’ve learned at AT&T about SDN and NFV. Some of the smartest network experts in the industry have drawn a map to help you navigate this journey. Their goal isn’t to predict the future but to…
In diesem Open-Access-Tagungsband sind die besten Beiträge des 8. Jahreskolloquiums "Bildverarbeitung in der Automation" (BVAu 2022) enthalten. Das Kolloquium fand am 02. November 2022 auf dem Innovation Campus Lemgo statt. Die vorgestellten neuesten…
Almost all aspects of the historian's research workflow have been transformed by digital technology. The Transformation of Historical Research in the Digital Age equips historians to be self-conscious practitioners by making these shifts explicit and…
Ethics and Academic Research examines both theories of ethical decision-making as well as apply those theories to a broad range of situations and questions within a research career and process. The focus is not only on what is wrong, or in doing the…
Managing Digital Records in Africa draws on the research work of the InterPARES Trust (ITrust) project that investigated interrelated archival issues focusing on legal analysis, infrastructure, trust, authentication, and education within the African…
Nonlocality was discovered by John Bell in 1964, in the context of the debates about quantum theory, but is a phenomenon that can be studied in its own right. Its observation proves that measurements are not revealing pre-determined values,…
In recent years, the rising complexity of Internet of Things (IoT) systems has increased their potential vulnerabilities and introduced new cybersecurity challenges. In this context, state of the art methods and technologies for security risk…