Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Recent Advances in Geo-Environmental Engineering, Geomechanics and Geotechnics, and Geohazards: Proceedings of the 1st Springer Conference of the ... in Science, Technology & Innovation)

Buy

This edited volume contains the best papers in the geo-engineering field accepted for presentation at the 1st Springer Conference of the Arabian Journal of Geosciences, Tunisia 2018. In addition, it includes 3 keynotes by international experts on the following topics:

1. A new three-dimensional rock mass strength criterion

2. New tools and techniques of remote sensing for geologic hazard assessment

3. Land subsidence induced by the engineering-environmental effects in Shanghai China

The book is useful for readers who would like to get a broad coverage in geo-engineering. It contains 11 chapters covering the following main areas: (a) Applications in geo-environmental engineering including soil remediation, (b) Characterization of geo-materials using geological, geotechnical and geophysical techniques, (c) Soil improvement applications, (d) Soil behaviour under dynamic loading, (e) Recent studies on expansive soils, (f) Analytical and numerical modelling of various geo-structures, (g) Slope stability, (h) Landslides, (i) Subsidence studies and (j) Recent studies on various other types of geo-hazards.

(HTML tags aren't allowed.)

Combinatorial Methods with Computer Applications (Discrete Mathematics and Its Applications)
Combinatorial Methods with Computer Applications (Discrete Mathematics and Its Applications)

Combinatorial Methods with Computer Applications provides in-depth coverage of recurrences, generating functions, partitions, and permutations, along with some of the most interesting graph and network topics, design constructions, and finite geometries. Requiring only a foundation in discrete mathematics, it can serve as the...

High Performance Cloud Auditing and Applications
High Performance Cloud Auditing and Applications

This book mainly focuses on cloud security and high performance computing for cloud auditing. The book discusses emerging challenges and techniques developed for high performance semantic cloud auditing, and presents the state of the art in cloud auditing, computing and security techniques with focus on technical aspects and feasibility of...

Self-Similar Network Traffic and Performance Evaluation
Self-Similar Network Traffic and Performance Evaluation
"The primary objective of the book is to present a comprehensive yet cohesive account of some of the principal developments..." (IEE Signal Processing, Vol. 18, No. 1, January 2001)

A collection of work from top researchers in the field, this book covers all aspects of self-similar network traffic. Readers will gain
...

Spring Persistence with Hibernate (Beginning)
Spring Persistence with Hibernate (Beginning)

Persistence is an important set of techniques and technologies for accessing and transacting data, and ensuring that data is mobile regardless of specific applications and contexts. In Java development, persistence is a key factor in enterprise, e-commerce, and other transaction-oriented applications.

Today, the Spring Framework is...

Texture Feature Extraction Techniques for Image Recognition (SpringerBriefs in Applied Sciences and Technology)
Texture Feature Extraction Techniques for Image Recognition (SpringerBriefs in Applied Sciences and Technology)

The book describes various texture feature extraction approaches and texture analysis applications. It introduces and discusses the importance of texture features, and describes various types of texture features like statistical, structural, signal-processed and model-based. It also covers applications related to texture features,...

Securing Office 365: Masterminding MDM and Compliance in the Cloud
Securing Office 365: Masterminding MDM and Compliance in the Cloud
Understand common security pitfalls and discover weak points in your organization’s data security, and what you can do to combat them. This book includes the best approaches to managing mobile devices both on your local network and outside the office.

Data breaches, compliance fines,  and
...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy