|
|
Showing 1 - 25 of
25 matches in All Departments
A missile flight simulation is a computational tool that calculates
the flight of a missile from launch until it engages the target.
The simulation is based on mathematical models of the missile,
target and environment. This book provides instruction for the
preparation of these mathematical models to simulate the flight of
a surface-to-air missile. The 2nd Edition of Missile Flight
Simulation provides updated simulation processes using MATLAB(R)
and Simulink(TM), while improving and clarifying previous content.
The book may be used as a reference or as a textbook, although it
is devoid of exercises. However, the reader is encouraged to
perform the simulation of Charter 12 using MATLAB(R) and
Simulink(TM), or a programming language such as FORTRAN (see
Chapter 10). The book is not intended to be a missile flight
engineering reference and does not contain every aspect of missile
flight. It provides the appropriate content for simulating missile
flight from launch to terminus only.
In Quantum Phaith (Faith), Dr. Strickland argued that Science and
Scripture are not at odds and Faith has substance. In Quantum Hope,
he argued that Hope is tangible. In Quantum Love, he argues that
Love is measureable. However, we cannot choose one of these in
favor of the other. Certainly Love is the greatest, but a
relationship exist between Faith, Hope, and Love, which requires
all three working together. Quantum Love argues from the base of
Scripture that Love is not some abstract concept and that real love
is only possible with the presence of the Holy Spirit. Although the
Bible is the basis, Dr. Strickland injects frequent episodes of
"What I Learned at the Movies." Often, Hollywood gets it wrong, but
there is an occasional nugget.
This book is about Data Analytics. In that respect, it is like
others. What distinguishes it from the rest is the variety of
open-source tool applications. This book incorporates the use of R
Studio, Python, SAS Studio (University Edition), and KNIME. This
book is also about manipulating Big Data. Apache Hadoop on
Hortonworks Sandbox is introduced and we manage, move, handle, and
transform data using Apache Hive, Apache Spark, MapReduce and TEZ,
with terminal shell commands and Ambari. We show you how to set up
a virtual machine in Microsoft Azure. We then use the data in later
chapters for modeling. We cover Descriptive Modeling and
Predictive. The content includes Support Vector Machines, Decision
Tree learning, Random Forests, Naive and Empirical Bayes, Gradient
Boosting, Cluster Modeling, Generalized Linear Models, Logistic
Regression, and Artificial Neural Networks. Every chapter includes
completely worked examples using one or more open-source tools.
We all need hope, yet we do not really understand what the origin
of this craving may be nor the ramifications of its completion.
After the Fall of Man, something was missing and resulted in our
separation from God. Quantum hope reconnects us through of faith in
Christ Jesus until that day when we will be fully restored. Quantum
Hope is the sequel to Quantum Phaith and prequel to Quantum Love
(not yet published). In Quantum Phaith, we learned what faith is
defined in Hebrews 11:1: "faith is the assurance of things hoped
for, the conviction of things not seen." Quantum Hope examines the
biblical hope as the connection between faith and love (1st
Corinthians 13:13). Hope is that which we persevere for and the
force that binds-an equilibrium. Unlike secular hope, quantum hope
encompasses several ideas and is measurable. We will see that
quantum hope is not only a character trait and a promise laid up in
heaven, but also a Person: Christ.
"The Men of Manhattan" is a short history of the origins and
development of the American atomic bomb program during World War
II, focusing on the men and woman who made it possible. Beginning
with the scientific developments of the pre-war years, the book
details the role of scientific exploration in conducting a secret,
nationwide enterprise that took science from the laboratory and
into combat with an entirely new type of weapon. Throughout the
book, short biographies of the men, and a women-Lise Meitner, Leona
Woods Marshall Libby, and Chien-Shiung Wu-are provided where most
pertinent. Although nuclear weapons still pose a threat to peace
throughout the world, splitting the atom was a watermark point in
nuclear science and quantum physics. Harnessed responsibly, the
enormous power of an atomic chain reaction can serve humanity for
good, e.g., atomic energy. Nuclear medicine and x-ray technology
are examples of the benefits brought about by these pioneers-the
Men of Manhattan.
A few of my blog readers asked me to share this story of my
military career as a series of blogs. When I set out writing about
this saga, I was just writing. I had not planned for it to evolve
into lessons about leadership, but it did. Years before I set out
on my military journey, a young officer on the staff of Thomas J
"Stonewall" Jackson, wrote I Rode with Stonewall. I never really
gave General William Scott Wallace a nickname, but if I had this
book would be called, I Rode with the Calm Man or I Rode with the
Quiet Man. I Rode with Wallace is about the modern U.S. Cavalry and
my ride in it, even though that ride only lasted eight years. I did
ride with Wallace for three of those eight, but I also rode with
Cook and Broll, Mitchell and Vanwinkle, Charlton and Hardesty,
Bates and McCoy. The book is organized into eight primary parts
based on blogs I wrote. Yet there is more material than appeared in
the blogs, including some unit histories and additional anecdotes.
Many graduates of formal educational programs do not enter the work
force ready to approach or solve the complex problems faced by
Systems Engineers (SE). This book describes the processes and
practices commonly employed for Systems Engineering which provide a
greater depth of understanding for Systems Engineers and Systems
Engineering Managers. Earlier chapters present an overview of the
Systems Engineering Processes; the Technical processes, Project
processes, and Organizational (Enterprise) processes; Life-Cycle
Stages; Enabling Systems Engineering processes; Systems Engineering
Support Activities; Specialty Engineering Activities; and SE
processes Tailoring. Later chapters describe the Systems
Engineering Processes and Practice including Standard SE processes;
the Stakeholder Requirements Definition Process; the Requirements
Definition Process; the Logical Decomposition Process and
Functional Analysis and Allocation; the Systems Architecture
Process; and the Trade Study Process.
The primary goal of this book is to assist the student to develop
the skills necessary to effectively employ the ideas of mathematics
to solve military problems. At the simplest level I seek to promote
an understanding of why mathematics is useful as a language for
characterizing the interaction and relationships among quantifiable
concepts, or in mathematical terms, variables. The text explores
models of terrorism, attrition, search, detection, missile defense,
radar, and operational reliability Throughout the text I emphasize
the notion of added value and why it is the driving force behind
military mathematical modeling. For a given mathematical model to
be deemed a success something must be learned that was not obvious
without the modeling procedure. Very often added value comes in the
form of a prediction. In the absence of added value the modeling
procedure becomes an exercise not unrelated to digging a ditch
simply to fill it back up again.
Weird Scientists is a sequel to Men of Manhattan. As I wrote the
latter about the nuclear physicists who brought in the era of
nuclear power, quantum mechanics (or quantum physics) was
unavoidable. Many of the contributors to the science of splitting
the atom were also contributors to quantum mechanics. Atomic
physics, particle physics, quantum physics, and even relativity are
all interrelated. This book is about the men and women who
established the science that shook the foundations of classical
physics, removed determinism from measurement, and created
alternative worlds of reality. The book introduces fundamental
concepts of quantum mechanics, roughly in the order they were
discovered, as a launching point for describing the scientist and
the work that brought forth the concepts.
This text presents the basic concepts of discrete event simulation
using ExtendSim 8. The book can be used as either a desk reference
or as a textbook for a course in discrete event simulation. This
book is intended to be a blend of theory and application,
presenting just enough theory to understand how to build a model,
design a simulation experiment, and analyze the results. Most of
the text is devoted to building models with ExtendSim 8, starting
with a simple single-server queue and culminating with a
transportation depot for package transfer and delivery. I have
built all the models contained in this book with ExtendSim 8 LT,
which limits the number of modeling blocks, but otherwise has the
required ExtendSim 8 capabilities. ExtendSim 8 LT is not included
in this book. Students may obtain ExtendSim 8 LT from Imagine That,
Inc. at www.extendsim.com/
store/cart.php?target=category&category_id=3. ExtendSim 8 is a
trademark of Imagine That, Inc.
Operations Research using open-source tools is a book that is
affordable to everyone and uses tools that do not cost you
anything. For less than $50, you can begin to learn and apply
operations research, which includes analytics, predictive modeling,
mathematical optimization and simulation. Plus there are ample
examples and exercise incorporating the use of SCILAB, LPSolve and
R. In fact, all the graphs and plot in the book were generated with
SCILAB and R. Code is provided for every example and solutions are
available at the authors website. The book covers the typical
topics in a one or two semester upper division undergrad program or
can be used in a graduate level course.
Predictive Crime Analysis using R is Dr. Strickland's second crime
analysis book. In this volume, rather than using data to describe
crime history, he uses it to predict crime using pattern created
with advanced clustering methods, crime series linkage, and text
analysis. Coverage includes prediction of conventional crime and
terrorist attacks. The open-source software R is introduced and
used in developing crime data, including Geo-spatial data, and
constructing predictive models and performing post analysis. Using
actual crime data from cities like Atlanta, Dr. Strickland also
shows how to simulate additional data from actual data. Simulated
data can then be used in cities with insufficient actual data, but
with similar demographics and human behavior.
This book is about Data Analytics. In that respect, it is like
others. What distinguishes it from the rest is the variety of
open-source tool applications. This book incorporates the use of R
Studio, Python, SAS Studio (University Edition), and KNIME. This
book is also about manipulating Big Data. Apache Hadoop on
Hortonworks Sandbox is introduced and we manage, move, handle, and
transform data using Apache Hive, Apache Spark, MapReduce and TEZ,
with terminal shell commands and Ambari. We show you how to set up
a virtual machine in Microsoft Azure. We then use the data in later
chapters for modeling. We cover Descriptive Modeling and
Predictive. The content includes Support Vector Machines, Decision
Tree learning, Random Forests, Naive and Empirical Bayes, Gradient
Boosting, Cluster Modeling, Generalized Linear Models, Logistic
Regression, and Artificial Neural Networks. Every chapter includes
completely worked examples using one or more open-source tools.
Data Science and Analytics for Ordinary People is a collection of
blogs I have written on LinkedIn over the past year. As I continue
to perform big data analytics, I continue to discover, not only my
weaknesses in communicating the information, but new insights into
using the information obtained from analytics and communicating it.
These are the kinds of things I blog about and are contained
herein. Data science and analytics have been used as synonyms on
occasion. In reality data science includes data modeling, data
mining, data analysis, database architecture and so on. Analytics
is what we do to make sense of the data. That is, we take data and
turn it into information for business decision makers. This our
course implies that we translate our data science jargon into
English.
This work began when I was appointed as a Technical Director for
Modeling and Simulation (M&S) Verification and Validation
(V&V) for a major defense system in 2008. It is intended to
provide the nuts and bolts of performing M&S V&V in one
volume. It is not intended to provide a holistic approach to
M&S V&V, as that can be derived from other sources. As
such, this book assumes a basic understanding of V&V, including
its place in the lifecycle, its purpose and its scope for ensuring
the quality of models and simulations. During the process of
developing this text, the Simulation Interoperability Standards
Organization (SISO) completed SISO-GUIDE-001.2-2013, Guide for
Generic Methodology for Verification and Validation (GM-VV) to
Support Acceptance of Models, Simulations, and Data, 2 Volumes,
June 2013. The guide does serve the purpose not covered by this
book. This text provides procedural details for performing V&V.
The procedures are static, dynamic and informal.
This book is about predictive modeling. Yet, each chapter could
easily be handled by an entire volume of its own. So one might
think of this as a survey of predictive models, both statistical
and machine learning. We define A predictive model as a statistical
model or machine learning model used to predict future behavior
based on past behavior. In order to use this book, the reader
should have a basic understanding of statistics (statistical
inference, models, tests, etc.)-this is an advanced book. Every
chapter culminates in an example using R. R is a free software
environment for statistical computing and graphics. It compiles and
runs on a wide variety of UNIX platforms, Windows and MacOS. The
book is organized so that statistical models are presented first
(hopefully in a logical order), followed by machine learning
models, and then applications: uplift modeling and time series. One
could use this as a textbook with problem solving in R (there are
no "by-hand" exercises).
In light of the 2nd Amendment debates, shooting may become the
national passtime. To act responsibly within the 2nd Amendment,
means knowing how to properly "bear arms". Knowing involves
understanding firearm types, firearm operation, ammunition,
internal ballistics, and shooting. These require training,
especially shooting. Whether you own or plan to own a handgun for
recreation, competition, or self-defense, training is of the utmost
importance. When you fire a projectile (bullet) from a firearm, you
are responsible for where it goes. You need to understand how fast
it travels, how far it can travel, and how accurate your firearm is
in delivering the projectile to your intended target. Yes, bearing
arms is a right, but not one to be taken lightly. Firing a handgun
is a grave responsibility and must be done correctly and with a
full understanding of all the components that make up "shooting".
Typically, scientist try to either prove or disprove Scripture, as
it relates the Creation story, then write books about their
findings. Quantum Phaith is not one of those books. Instead, the
author accepts the Word of God, a priori. Quantum Phaith is a
journey through elementary quantum mechanics, chaos theory, number
theory, and more. This is also a journey through the author's faith
and what he has discovered about science through it; his faith has
been unshaken by science and mathematics. Quantum Phaith examines
the Creation account, using the results to support what scientists
have discovered about the universe. Their discoveries were already
contained in the Bible! Quantum Phaith portrays God as perfect, His
creation perfect in every regard. Imperfection was introduced by
the Fall or Man. God is all-powerful, all-knowing, transcends time,
space, and our understanding. God is order, and you will find that
chaos contains unobservable order! Quantum Phaith will make you
think. It may change your life.
Simulation Conceptual Modeling explores several system analysis
methods and conceptual modeling techniques. It also discusses
appropriate tools that may be used to assist with conceptual
modeling. In addition, it discusses how to evaluate the quality of
a conceptual model. Some commonly used conceptual modeling
techniques and methods include; Data Flow Modeling, Entity
Relationship Modeling, Event-Drive Process Chain, Joint Application
Development, Place/Transition Net Modeling, State Transition
Modeling, Object Role Modeling, and Unified Modeling Language
(UML).
|
|