| As our knowledge of MEMS continues to grow, so does The MEMS Handbook. The field has changed so much that this Second Edition is now available in three volumes. Individually, each volume provides focused, authoritative treatment of specific areas of interest. Together, they comprise the most comprehensive collection of MEMS knowledge available, packaged in an attractive slipcase and offered at a substantial savings. This best-selling handbook is now more convenient than ever, and its coverage is unparalleled.
The first of three volumes, MEMS: Introduction and Fundamentals covers the theoretical and conceptual underpinnings of the field, emphasizing the physical phenomena that dominate at the micro-scale. It also explores the mechanical properties of MEMS materials, modeling and simulation of MEMS, control theory, and bubble/drop transport in microchannels. Chapters were updated where necessary, and the book also includes two new chapters on microscale hydrodynamics and lattice Boltzmann simulations. This volume builds a strong foundation for further study and work in the MEMS field. MEMS: Introduction and Fundamentals comprises contributions from the foremost experts in their respective specialties from around the world. Acclaimed author and expert Mohamed Gad-el-Hak has again raised the bar to set a new standard for excellence and authority in the fledgling fields of MEMS and nanotechnology. |
|
|
 Control of Single Wheel Robots (Springer Tracts in Advanced Robotics)This monograph presents a novel concept of a mobile robot, which is a single-wheel, gyroscopically stabilized robot. The robot is balanced by a spinning wheel attached through a two-link manipulator at the wheel bearing, and actuated by a drive motor. This configuration conveys significant advantages including insensitivity to attitude... |  |  Bulletproofing Web Applications (With CD-ROM)“Bulletproofing” is a road map for how to integrate error prevention and detection into the development process to ensure that Web applications are robust, scalable, efficient and reliable. It explores defensive programming techniques and explains the benefits of, and how to, implement coding standards for various programming languages... |  |  |
|