Explosive Effects and Applications

Front Cover
Springer Science & Business Media, Nov 14, 2002 - Science - 433 pages
0 Reviews
This is a broad-based text on the fundamentals of explosive behavior and the application of explosives in civil engineering, industrial processes, aerospace applications, and military uses. The book includes chapters on all aspects of explosives, each written by an expert in the field: Introduction to Explosives (W.C. Davis) Explosives Development and Fundamentals of Explosives Technology (P.R. Lee) Shock Waves, Rarefaction Waves, Equations of State (W.C. Davis) Introduction to Detonation Physics (P. Cooper) The Chemistry of Explosives (J.C. Oxley) Theories and Techniques of Initiation (P.R. Lee) The Gurney Model for Explosive Output (J.E. Kennedy) Hazard Assessment of Explosives and Propellants (P.R. Lee) Safe Handling of Explosives (J.C. Oxley) Demolitions (C. Weickert)
  

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Grid Computing Workshop
1
A Shakable Snake for Estimation of Image Contours
9
A Fast Construction Algorithm for the Incidence Matrices
11
A New Recurrent Fuzzy Associative Memory for Recognizing
17
A Smart AgentBased Grid Computing Platform
20
A Novel Approach for ContentsBased Ecatalogue Image Retrieval
25
Optimal Gait Control for a Biped Locomotion
29
A Useful Method for Multiple Sequence Alignment
30
A Framework for Security Assurance in Component Based Development
587
Fast and Efficient Rendering System
592
Information Fusion for Probabilistic Reasoning and Its Application
593
An Authenticated Key Agreement Protocol Resistant
603
A Case Study in Applying Common Criteria to Development Process
608
Track on Computational Methods
611
Parametric Freehand Sketches
613
Efficient PasswordBased Authenticated Key Agreement Protocol
617

A FeatureBased Algorithm for Recognizing Gestures
33
The PROVE Trace Visualisation Tool as a Grid Service
37
A Bayes Algorithm for the Multitask Pattern Recognition Problem
39
Fingerprint Matching Based on Linking Information Structure
41
Energy Efficient Routing with Power Management
46
Video Summarization Using Fuzzy OneClass Support Vector Machine
49
New Parameter for Balancing Two Independent Measures
56
A Study on Efficient Key Distribution and Renewal
66
Optimal Server Allocation in Reconfigurable Clusters with
76
A Transcode and Prefetch Technique of Multimedia Presentations
89
Task Allocation for Minimizing Programs Completion Time
97
Constructing Control Flow Graph for Java by Decoupling Exception
106
A Rollback Recovery Algorithm for Intrusion Tolerant Intrusion
107
3DColorStructureCode A New Nonplainness Island Hierarchy
109
Adaptive IntervalBased Caching Management Scheme for Cluster
116
A Document Classification Algorithm Using the Fuzzy Set Theory
122
Track on Parallel and Distributed Computing
124
Partitioning Orthogonal Polygons by Extension of All Edges
127
The Measurement of an Optimum Load Balancing Algorithm in
136
Network Security Management Using ARP Spoofing
142
A DAGBased XCIGS Algorithm for Dependent Tasks
158
A Digital Watermarking Scheme in JPEG2000 Using the Properties
159
A Fuzzy Expert System for Network Forensics
175
Parallel and Distributed Computing Workshop
178
A Design of Preventive Integrated Security Management System
183
Conflict Resolution of Data Synchronization in Mobile Environment
196
Authentication of Mobile Node Using AAA in Coexistence of
199
Maximizing Parallelism for Nested Loops
213
New Approach for Secure and Efficient Metering
215
Multiplier with Parallel CSA Using CRTs Specific Moduli
216
Detection Techniques for ELF Executable File Using Assembly
230
Gossip Based Causal Order Broadcast Algorithm
233
Remote Visualization Based on Grid Computing
236
Incremental Adaptive Loop Subdivision
237
A Modified AODV Protocol with Multipaths Considering Classes
239
Committing Secure Results with Replicated Servers
246
Reverse Subdivision Multiresolution for Polygonal Silhouette
247
A Modified Parallel Computation Model Based on Cluster
252
Cylindrical Approximation of a Neuron from
257
Design and Implementation of the HoneyPot System with Focusing
262
Skeletizing SDObjects by Projections
267
A Parallel Volume Splatting Algorithm Based on PCClusters
272
Track on Computational Geometry
277
A QoS Improvement Scheme for RealTime Traffic
278
Error Concealment Method Using ThreeDimensional
288
A Queue Management Scheme for Alleviating the Impact
294
Confidence Sets for the Aumann Mean of a Random Closed Set
298
An Algorithm of Mapping Additional Scalar Value in 2D Vector
308
Traffic Control Scheme of ABR Service Using NLMS in ATM Network
310
Numerical Revelation and Analysis of Critical Ignition Conditions
313
Exact Calculation
315
Curvature Dependent Polygonization by the Edge Spinning
325
Bond Order Potentials for a priori Simulations
328
A Novel Model for Defining Topological LineRegion Relations
335
Inorganic Phosphates Investigation by Support Vector Machine
338
Layered WebCaching Technique for VOD Services
345
RealTime Video Watermarking for MPEG Streams
348
Characterization of Equilibrium Structure for N2N2 Dimer
350
Approximation Algorithms for fcSource Bottleneck Routing Cost
355
A Time Dependent Study of the Nitrogen Atom Nitrogen
357
From DFT Cluster Calculations to Molecular Dynamics Simulation
366
Efficient Sequential and Parallel Algorithms for Popularity
367
Object Boundary Edge Selection Using LevelofDetail Canny Edges
369
Molecular Mechanics and Dynamics Calculations to Bridge Molecular
374
An Experiment and Design of WebBased Instruction Model
378
Direct Simulation Monte Carlo Modeling of Non Equilibrium
383
A Study on Neural Networks Using Taylor Series Expansion
389
Molecular Simulation of Reaction and Adsorption in Nanochemical
392
PMEPR Reduction Algorithms for STBCOFDM Signals
394
Quantum Generalization of Molecular Dynamics Method
402
Speech Emotion Recognition and Intensity Estimation
406
The Efficient WebBased Mobile GIS Service System
410
Ions as Intermediates in the Reaction between
412
Automatic Selecting Coefficient for Semiblind Watermarking
421
Towards a Full Dimensional Exact Quantum Calculation
422
A Web Based Model for Analyzing Compliance of Mobile Content
426
Conformations of 1246Tetrathiepane
432
Differentiated Web Service System through KernelLevel Realtime
441
BitSerial Multipliers for Exponentiation and Division
442
Numerical Models in Biomechanics Session
445
Achieving Fair New Call CAC for Heterogeneous Services
460
Design on Mobile Secure Electronic Transaction Protocol
461
Musculoskeletal Modeling of Lumbar Spine under Follower Loads
467
A SequenceFocused Parallelisation of EMBOSS on a Cluster
473
Visual Mining of Market Basket Association Rules
479
A Design of Configuration Management Practices and CMPET
481
Encoding Image Based on Retinal Ganglion Cell
486
Deformable Templates for Recognizing the Shape
489
Track on Signal Processing
493
Track on Software Engineering
496
A FaultTolerant Mobile Agent Model in Replicated Secure Services
500
Integrating Medical Imaging into a Grid Based
505
Track on Cluster Computing
508
Using C++ Functors with Legacy C Libraries
514
A Study on Smart Card Security Evaluation Criteria
517
ParallelDistributed Film Line Scratch Restoration
525
A Cluster Based Hierarchical Routing Protocol for Mobile Networks
528
Frameworks as Web Services
534
Supporting Adaptive Security Levels in Heterogeneous Environments
537
On Triangulations
544
Cache Conscious Dynamic Transaction Routing
548
A Reduced Codification for the Logical Representation
553
Probability Distribution of OpCodes in Edgebreaker
554
A Study on Key Recovery Agent Protection Profile Having
557
An Adaptive Prefetching Method for Web Caches
566
Synthesis of Mechanical Structures Using a Genetic Algorithm
573
Track on Security Engineering
574
Track on Computational Medicine
575
Improving Productivity and Enhancing the Reusability
577
Architecture Environments for Ebusiness Agent Based on Security
625
Workshop on Computational Geometry
630
Bezier Solutions of the Wave Equation
631
A Novel Data Encryption and Distribution Approach
637
Simple and Efficient Group Key Agreement
643
Generation of Unordered Binary Trees
648
A Differential Method for Parametric Surface Intersection
651
Multiparty Key Agreement Protocol with Cheater Identification
655
Secure Handoff Based on Dual Session Keys in Mobile
663
Asymptotic Error Estimate of Iterative NewtonType Methods
667
Visualization of Large Terrain Using Nonrestricted
671
IDBased Authenticated MultipleKey Agreement Protocol
672
A Defense Mechanism Knowledge Base
683
Improved Mathematical
686
A Secure and Flexible Multisigncryption Scheme
689
Image Coherence Based Adaptive Sampling for Image Synthesis
693
A New RoleBased Authorization Model
701
A Comparison of Multiresolution Modelling
703
Applications of Fuzzy Data Mining Methods for Intrusion
706
Effective Packet Marking Approach to Defend against DDoS Attack
708
Texture Mapping on Arbitrary 3D Surfaces
721
A Robust Image Authentication Method Surviving Acceptable
722
A Relationship of Configuration Management Requirements
725
Optimizing Symmetric FFTs with Prime EdgeLength
736
Performance Improvement in Mobile IPv6 Using
738
A Bandwidth Reduction Scheme for 3D TextureBased Volume
741
ContextBased Proofreading of Structured Documents
743
A PolicyBased Security Management Architecture Using XML
755
Where the Truth Lies in Automatic Theorem Proving
761
Storing Together the Structural Information of XML Documents
763
An Integrated XML Security Mechanism for Mobile Grid Application
776
An Application of Computer Graphics for Landscape
779
Isolating and Specifying the Relevant Information of
783
A Scheme for Improving WEP Key Transmission between
792
View Morphing Based on Autocalibration for Generation
799
A New Pedagogical
807
An ObjectOriented Metric to Measure the Degree of Dependency
808
Security Issues in Network File Systems
812
Virtual Reality Technology Applied to Simulate
817
A ContentIndependent Scalable Encryption Model
821
Virtual Reality Applied to Molecular Sciences
827
Multimodal Biometrics System Using Face and Signature
828
Design Analysis and Optimization of LCD Backlight Unit Using
837
A Geometrical Approach for Network Intrusion Detection
841
Dynamically Changing Road Networks Modelling
843
An Efficient Parameter Estimation Technique
847
Association Inlining for Mapping XML DTDs to Relational Tables
849
A Computer Tool for the Generation
857
Use of Spectral Techniques in the Design
859
Ontologies in Fashion
863
Macroscopic Treatment to Polymorphic Email Based Viruses
867
An Efficient Cache Conscious Multidimensional Index Structure
869
Making Discrete Games
877
WebBased Learning Session
880
A Scalable PKI for Secure Routing in the Internet
882
Speech Driven Facial Animation Using Chinese Mandarin
886
Feature Extraction and Correlation for Timetoimpact
887
Cryptanalysis and Improvement of Password Authenticated
895
Autonomic Protection System Using Adaptive Security Policy
896
The Development and Application of a WebBased Information
902
Efficient Prefetch and Prerelease Based Buffer Cache Management
906
DDoS Attack Defense Architecture Using
915
Observing Standards for WebBased Learning from the Web
922
A New Approach for Numerical Identification
926
KolmogorovSmirnov Test for Image Comparison
933
Chaotic Protocols
938
Relevance Feedback for ContentBased Image Retrieval Using
942
Track on Mobile Computing Systems
945
Image Corner Detection Using Radon Transform
948
From Axial Maps to Mark Point Parameter Analysis Ma P P A
v
Geometric Graphs Realization as Coin Graphs 1
1
A Multi Agent
5
Disc Covering Problem with Application to Digital Halftoning 11
11
On Local Transformations in Plane Geometric Graphs Embedded
22
Reducing the Time Complexity of MinkowskiSum Based Similarity
32
Efficient Key Distribution Protocol for Secure Multicast
34
A Practical Algorithm for Approximating Shortest Weighted Path
42
PlaneSweep Algorithm of Onlogn for the Inclusion Hierarchy
53
Shortest Paths for Disc Obstacles 62
62
A Study on Generating an Efficient Bottomup Tree Rewrite Machine
65
Improving the Global Continuity of the Natural
71
A Study on Methodology for Enhancing Reliability of Datapath 73
73
SelfTuning Mechanism for Genetic Algorithms Parameters
77
Combinatorics and Triangulations 81
81
DigitSerial AB2 Systolic Array for Division in GF2m 87
87
Approximations for Two DecompositionBased Geometric
90
Computing Largest Empty Slabs 99
99
A Linear Systolic Array for Multiplication in GF2m
106
A Novel LMS Method for RealTime Network Traffic Prediction 127
127
On the Time Complexity of Rectangular Covering Problems
137
A MarketBased Scheduler for JXTABased PeertoPeer
147
CORBABased Multithreaded Distributed Simulation
167
Automated Model Generation System Based on Freeform Deformation
178
A Systematic Database Summary Generation Using
185
The Employment of Regular Triangulation for Constrained
198
Implementation of the VoronoiDelaunay Method for Analysis
217
Intermediate View Synthesis from Stereoscopic
243
Control Messaging Channel for Distributed Computer Systems 261
261
DistortionFree of General Information with Edge Enhanced Error
281
Filtering of Colored Noise for Signal Enhancement 301
301
Effective Digital Watermarking Algorithm by Contour Detection 321
321
Decentralized Interagent Message Forwarding Protocols
376
Optimization of Usability on an Authentication System Built from
386
An Efficient Simple Cooling Schedule for Simulated Annealing 396
396
A ProblemSpecific Convergence Bound for Simulated
405
Comparison and Selection of Exact and Heuristic Algorithms 415
415
Adaptive Texture Recognition in Image Sequences with Prediction
425
Fuzzy Matching of User Profiles for a Banner Engine 433
433
Copyright

Common terms and phrases

References to this book

All Book Search results »