03466nam 22004093 450 991046727250332120210901202757.00-19-102950-5(CKB)4330000000035520(MiAaPQ)EBC1073450(Au-PeEL)EBL1073450(OCoLC)958573760(EXLCZ)99433000000003552020210901d2011 uy 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierThe Beautiful Invisible Creativity, Imagination, and Theoretical PhysicsOxford :Oxford University Press, Incorporated,2011.©2011.1 online resource (320 pages)0-19-957484-7 Cover -- Contents -- 1 Reality is invisible -- 2 The way of the abstract -- A science within the science -- The tapestry -- Fantastic precision -- The formal and the abstract -- Praise of the abstract -- 3 Limits -- Discontinuity from continuity -- Zeno's paradox -- Two degrees of separation -- Galileo and Aristotle -- Privileged frames -- The laws of dynamics -- Illuminations -- Newton and Kepler -- Aristotle and Newton -- Aristotle with a twist -- Vortices -- 4 Laws are made to be broken -- Law and order -- Broken symmetry -- Permanence is but a word of degrees -- Circles -- 5 Of first and last things -- An issue of control -- The Second Law -- The reality of atoms -- Maxwell's demon -- The exception and the rule -- The same things return -- Overwhelming questions -- 6 Representations -- Geometry and coordinates -- Space-time -- Einstein's relativity -- E=mc[(sup)2] -- The general theory -- A lesson from the Nazis -- 7 The invisible light -- A call from the mountain -- Electromagnetic field: an epic in four books -- Electromagnetic waves -- Radiation and retardation -- The principle of superposition -- Interference and rays -- Ether and the void -- 8 The double helix -- Mechanics and geometry -- Harmonic oscillator -- Symmetry and conservation laws -- Oscillators of light -- 9 Quantum mechanics: the triumph of the abstract -- In the cockpit -- The mystery -- Prying into the mystery -- The oracle -- The uncertainty principle -- Complex numbers -- Wave functions in action -- The quantum state -- The no-cloning theorem -- Quantum pragmatism or quantum reality? -- 10 Tales of quantum reality -- Seeing in the dark -- 'A watched pot never boils' -- How to share a secret -- Two halves of the same body -- Bell's inequality -- Teleportation -- Quantum computation -- Kids' physics -- 11 The spinning electron and other metaphors -- Doublets.A good question with a better answer -- Spinors -- The exclusion principle -- Dirac's void -- Quantum field theory -- Superconductivity -- 12 Margarita -- Photographic Acknowledgements -- Index.Theoretical physics, argues Giovanni Vignale, is an endeavour of deep imagination and creativity. And the quest to explain profoundly abstract ideas in concrete images makes it strangely akin to poetry and literature. Vignale leads us through beautiful and bizarre worlds, explaining them in his own unique way.Electronic books.530Vignale Giovanni498926MiAaPQMiAaPQMiAaPQBOOK9910467272503321The Beautiful Invisible2461803UNINA04139nam 2201153z- 450 991059506690332120231214133325.0(CKB)5680000000080864(oapen)https://directory.doabooks.org/handle/20.500.12854/92138(EXLCZ)99568000000008086420202209d2022 |y 0engurmn|---annantxtrdacontentcrdamediacrrdacarrierComputational Methods for Medical and Cyber SecurityBaselMDPI Books20221 electronic resource (228 p.)3-0365-5115-8 3-0365-5116-6 Over the past decade, computational methods, including machine learning (ML) and deep learning (DL), have been exponentially growing in their development of solutions in various domains, especially medicine, cybersecurity, finance, and education. While these applications of machine learning algorithms have been proven beneficial in various fields, many shortcomings have also been highlighted, such as the lack of benchmark datasets, the inability to learn from small datasets, the cost of architecture, adversarial attacks, and imbalanced datasets. On the other hand, new and emerging algorithms, such as deep learning, one-shot learning, continuous learning, and generative adversarial networks, have successfully solved various tasks in these fields. Therefore, applying these new methods to life-critical missions is crucial, as is measuring these less-traditional algorithms' success when used in these fields.fintechfinancial technologyblockchaindeep learningregtechenvironmentsocial sciencesmachine learninglearning analyticsstudent field forecastingimbalanced datasetsexplainable machine learningintelligent tutoring systemadversarial machine learningtransfer learningcognitive biasstock marketbehavioural financeinvestor’s profileTeheran Stock Exchangeunsupervised learningclusteringbig data frameworksfault tolerancestream processing systemsdistributed frameworksSparkHadoopStormSamzaFlinkcomparative analysisa surveydata scienceeducational data miningsupervised learningsecondary educationacademic performancetext-to-SQLnatural language processingdatabasemachine translationmedical image segmentationconvolutional neural networksSE blockU-netDeepLabV3pluscyber-securitymedical servicescyber-attacksdata communicationdistributed ledgeridentity managementRAFTHL7electronic health recordHyperledger Composercybersecuritypassword securitybrowser securitysocial mediaANOVASPSSinternet of thingscloud computingcomputational modelsmetaheuristicsphishing detectionwebsite phishingLuo Suhuaiedt1322438Shaukat KamranedtLuo SuhuaiothShaukat KamranothBOOK9910595066903321Computational Methods for Medical and Cyber Security3035003UNINA