Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Object-Oriented Programming with Visual Basic.NET
Object-Oriented Programming with Visual Basic.NET
Visual Basic is arguably the most popular application development programming language in use today. Thousands, if not millions, of programmers use it every day to build both commercial and scientific applications. The language is also one of the most maligned programming languages, second perhaps only to Cobol.

...
Vision in 3D Environments
Vision in 3D Environments
Seeing in 3D is a fundamental problem for anyorganism or device that has to operate in the real world. Answering questions such as “how far away is that?” or “can we fit through that opening?” requires perceiving and making judgments about the size of objects in three dimensions. So how do we see in...
Emerging Wireless Technologies and the Future Mobile Internet
Emerging Wireless Technologies and the Future Mobile Internet
The current Internet is an outgrowth of the ARPANET (Advanced Research Projects Agency Network) that was initiated four decades ago. The TCP/IP (Transmission Control Protocol/Internet Protocol) designed by Vinton Cerf and Robert Kahn in 1973 did not anticipate, quite understandably, such extensive use of wireless channels and...
Modern Fortran: Style and Usage
Modern Fortran: Style and Usage

Fortran is one of the oldest high-level languages and remains the premier language for writing code for science and engineering applications. Modern Fortran: Style and Usage is a book for anyone who uses Fortran, from the novice learner to the advanced expert. It describes best practices for programmers, scientists, engineers, computer...

Software Receiver Design: Build Your Own Digital Communication System in Five Easy Steps
Software Receiver Design: Build Your Own Digital Communication System in Five Easy Steps

Have you ever wanted to know how modern digital communications systems work? Find out with this step-by-step guide to building a complete digital radio that includes every element of a typical, real-world communication system. Chapter by chapter, you will create a MATLAB realization of the various pieces of the system, exploring the key ideas...

Quantum Cryptography and Secret-Key Distillation
Quantum Cryptography and Secret-Key Distillation
This book aims at giving an introduction to the principles and techniques of quantum cryptography, including secret-key distillation, as well as some more advanced topics. As quantum cryptography is now becoming a practical reality with products available commercially, it is important to focus not only on the theory of quantum...
Cascade Separation of Powders
Cascade Separation of Powders
Industry imposes stringent requirements on the quality of powder materials used in many areas of technology. To satisfy these requirements, it is necessary to overcome technical problems and find solutions of the problems, in most cases by the application of highly efficient separation processes.

The authors describe the...

Metal Forming: Mechanics and Metallurgy
Metal Forming: Mechanics and Metallurgy
My coauthor Robert Caddell died in 1990. I have greatly missed interacting with him.

The biggest changes from the second edition are an enlargement and reorganization of the last third of the book, which deals with sheet metal forming. Changes have been made to the chapters on bending, plastic anisotropy, and cup
...
Mechanical Behavior of Materials
Mechanical Behavior of Materials
Everything that surrounds us is matter. The origin of the word matter is mater (Latin) or matri (Sanskrit), for mother. In this sense, human beings anthropomorphized that which made them possible – that which gave them nourishment. Every scientific discipline concerns itself with matter. Of all matter surrounding us, a...
Bayesian Reasoning and Machine Learning
Bayesian Reasoning and Machine Learning
We live in a world that is rich in data, ever increasing in scale. This data comes from many di erent sources in science (bioinformatics, astronomy, physics, environmental monitoring) and commerce (customer databases, nancial transactions, engine monitoring, speech recognition, surveillance, search). Possessing the knowledge as to...
Ancient China and its Enemies: The Rise of Nomadic Power in East Asian History
Ancient China and its Enemies: The Rise of Nomadic Power in East Asian History
In the time of Duke Huan of Ch’i [the position of] the son of Heaven had become humble and weak, while the feudal lords used their energies in attacking [one another]. The Southern Yi and Northern Ti engaged the Central States in battle, and the continued existence of the Central States seemed [to hang by] a thin thread...
Mining of Massive Datasets
Mining of Massive Datasets
This book evolved from material developed over several years by Anand Rajaraman and Jeff Ullman for a one-quarter course at Stanford. The course CS345A, titled “Web Mining,” was designed as an advanced graduate course, although it has become accessible and interesting to advanced undergraduates.

The popularity of...

unlimited object storage image
Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy