Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
3+1 Formalism in General Relativity: Bases of Numerical Relativity (Lecture Notes in Physics, Vol. 846)

Buy

This graduate-level, course-based text is devoted to the 3+1 formalism of general relativity, which also constitutes the theoretical foundations of numerical relativity. The book starts by establishing the mathematical background (differential geometry, hypersurfaces embedded in space-time, foliation of space-time by a family of space-like hypersurfaces), and then turns to the 3+1 decomposition of the Einstein equations, giving rise to the Cauchy problem with constraints, which constitutes the core of 3+1 formalism. The ADM Hamiltonian formulation of general relativity is also introduced at this stage. Finally, the decomposition of the matter and electromagnetic field equations is presented, focusing on the astrophysically relevant cases of a perfect fluid and a perfect conductor (ideal magnetohydrodynamics). The second part of the book introduces more advanced topics: the conformal transformation of the 3-metric on each hypersurface and the corresponding rewriting of the 3+1 Einstein equations, the Isenberg-Wilson-Mathews approximation to general relativity, global quantities associated with asymptotic flatness (ADM mass, linear and angular momentum) and with symmetries (Komar mass and angular momentum). In the last part, the initial data problem is studied, the choice of spacetime coordinates within the 3+1 framework is discussed and various schemes for the time integration of the 3+1 Einstein equations are reviewed. The prerequisites are those of a basic general relativity course with calculations and derivations presented in detail, making this text complete and self-contained. Numerical techniques are not covered in this book.

(HTML tags aren't allowed.)

CISSP: Certified Information Systems Security Professional Study Guide
CISSP: Certified Information Systems Security Professional Study Guide
Here's the book you need to prepare for the CISSP exam from (ISC)2. Written by a team of experienced security experts who know exactly what it takes to pass the test, this Study Guide provides:

Assessment testing to focus and direct your studies In-depth coverage of official test domains Hundreds of challenging practice questions, in the book...

Microsoft Access VBA Programming for the Absolute Beginner, Third Edition
Microsoft Access VBA Programming for the Absolute Beginner, Third Edition
If you are new to programming with Microsoft Access VBA and are looking for a solid introduction, this is the book for you. Developed by computer science professors, books in the for the absolute beginner series teach the principles of programming through simple game creation. Covering Access 2007, Microsoft Access VBA Programming for the Absolute...
The 100 Simple Secrets of Happy People: What Scientists Have Learned and How You Can Use It
The 100 Simple Secrets of Happy People: What Scientists Have Learned and How You Can Use It

Scientists and academics have spent entire careers investigating what makes people happy. But hidden in obscure scholarly journals and reports, their research is all too often inaccessible to ordinary people. Now the bestselling author of the 100 Simple Secrets series distills the scientific findings of over a thousand of the most important...


Microsoft System Center Orchestrator 2012 R2 Essentials
Microsoft System Center Orchestrator 2012 R2 Essentials

Design, implement, and improve your infrastructure administration with System Center Orchestrator 2012 R2's automation process

About This Book

  • Learn about the components of Orchestrator, the design and implementation process, and the way it interacts with your environment to create outstanding...
The Lucent Library of Science and Technology - Artificial Intelligence
The Lucent Library of Science and Technology - Artificial Intelligence
As far back as the ancient Greek civilization, people have imagined machines and mechanical men that could work and think like any human. One Greek myth, for example, tells of the Greek god Hephaestus, who built mechanical men to forge powerful weapons and spectacular jewelry. When the king of Crete requested that he make a giant man to guard his...
Security Risk Management: Building an Information Security Risk Management Program from the Ground Up
Security Risk Management: Building an Information Security Risk Management Program from the Ground Up

The goal of Security Risk Management is to teach you practical techniques that will be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. Security professionals often fall into the trap of telling the business that they need to fix something, but they can't explain...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy