Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Essentials of Human Anatomy & Physiology, Global Edition
Essentials of Human Anatomy & Physiology, Global Edition
Elaine Marieb After receiving her Ph.D. in zoology from the University of Massachusetts at Amherst, Elaine N. Marieb joined the faculty of the Biological Science Division of Holyoke Community College. While teaching at Holyoke Community College, where many of her students were pursuing nursing degrees, she developed a...
104 Number Theory Problems: From the Training of the USA IMO Team
104 Number Theory Problems: From the Training of the USA IMO Team
This challenging problem book by renowned US Olympiad coaches, mathematics teachers, and researchers develops a multitude of problem-solving skills needed to excel in mathematical contests and research in number theory. Offering inspiration and intellectual delight, the problems throughout the book encourage students to express their ideas,...
Turing (A Novel about Computation)
Turing (A Novel about Computation)
Our hero is Turing, an interactive tutoring program and namesake (or virtual emanation?) of Alan Turing, World War II code breaker and father of computer science. In this unusual novel, Turing's idiosyncratic version of intellectual history from a computational point of view unfolds in tandem with the story of a love affair involving Ethel, a...
Therapeutic Stretching: Towards a Functional Approach, 1e
Therapeutic Stretching: Towards a Functional Approach, 1e

"This is a highly enjoyable and well presented book that I recommend for any clinician from student to experienced practitioner. It is suitable for all physiotherapists, manual therapists, sports physiotherapists/therapists, strength and conditioning coaches, sports scientists, athletes and patients who would like to understand, recover...

Rough Computing: Theories, Technologies and Applications
Rough Computing: Theories, Technologies and Applications
Rough set theory is a new soft computing tool which deals with vagueness and uncertainty. It has attracted the attention of researchers and practitioners worldwide, and has been successfully applied to many fields such as knowledge discovery, decision support, pattern recognition, and machine learning.

Rough Computing: Theories,...

Quantum Approach to Informatics
Quantum Approach to Informatics
An essential overview of quantum information

Information, whether inscribed as a mark on a stone tablet or encoded as a magnetic domain on a hard drive, must be stored in a physical object and thus made subject to the laws of physics. Traditionally, information processing such as computation occurred in a framework governed by laws of classical...

Control of Robot Manipulators in Joint Space (Advanced Textbooks in Control and Signal Processing)
Control of Robot Manipulators in Joint Space (Advanced Textbooks in Control and Signal Processing)
Robot control is the backbone of robotics, an essential discipline in the maintenance of high quality and productivity in modern industry. The most common method of control for industrial robotic manipulators relies on the measurement and amendment of joint displacement: so-called "joint-space control".

Control of Robot...

React.js Essentials
React.js Essentials

A fast-paced guide to designing and building scalable and maintainable web apps with React.js

About This Book

  • Build maintainable and performant user interfaces for your web applications using React.js
  • Create reusable React.js components to save time and effort in maintaining your user...
Patterns for e-business
Patterns for e-business
Get an inside look at how successful businesses build their e-business architectures. In this book, four IBM e-business experts capture years of experience into easy-to-follow guidelines. Deliberately focusing on Business patterns, Integration patterns, and Application patterns, the authors share with you proven architectural patterns that can help...
Design of Hashing Algorithms (Lecture Notes in Computer Science)
Design of Hashing Algorithms (Lecture Notes in Computer Science)

Historically, computer security is related to both cryptography and access control in operating systems. Cryptography, although mostly applied in the military and diplomacy, was used to protect communication channels and storage facilities (especially the backups). In the seventies there was a breakthrough in cryptography - the...

Biometric Recognition: Challenges and Opportunities
Biometric Recognition: Challenges and Opportunities

Biometric recognition--the automated recognition of individuals based on their behavioral and biological characteristic--is promoted as a way to help identify terrorists, provide better control of access to physical facilities and financial accounts, and increase the efficiency of access to services and their utilization. Biometric...

Classification, Clustering, and Data Mining Applications: Proceedings
Classification, Clustering, and Data Mining Applications: Proceedings
This book presents some of the key research undertaken by the members of the International Federation of Classification Societies during the two years since our last symposium. If the past is a guide to the future, these papers contain the seeds of new ideas that will invigorate our field.

The editors are grateful
...
Result Page: 24 23 22 21 20 19 18 17 16 15 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy