Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Linear and Nonlinear Multivariable Feedback Control: A Classical Approach
Linear and Nonlinear Multivariable Feedback Control: A Classical Approach

Automatic feedback control systems play crucial roles in many fields, including manufacturing industries, communications, naval and space systems. At its simplest, a control system represents a feedback loop in which the difference between the ideal (input) and actual (output) signals is used to modify the behaviour of the system. Control...

Flow Cytometry in Hematopathology: A Visual Approach to Data Analysis and Interpretation (Current Clinical Pathology)
Flow Cytometry in Hematopathology: A Visual Approach to Data Analysis and Interpretation (Current Clinical Pathology)

Flow cytometry immunophenotyping of hematopoietic disorders is a complex and demanding exercise that requires a good understanding of cell lineages, developmental pathways, and physiological changes, as well as broad experience in hematopathology. The process includes several interrelated stages, from the initial medical decision regarding...

Apache CloudStack Cloud Computing
Apache CloudStack Cloud Computing

Setting up a cloud computing service, whether for yourself or a customer, is greatly simplified by this step-by-step guide to Cloudstack – the world’s leading open source platform. It’s all here, from installing to extending.

Overview

  • Install, deploy, and manage a cloud service using...
Technology Due Diligence: Best Practices for Chief Information Officers, Venture Capitalists, and Technology Vendors
Technology Due Diligence: Best Practices for Chief Information Officers, Venture Capitalists, and Technology Vendors
Due diligence conducted around technology decisions is complex. Done correctly, it has the power to enable outstanding positive outcomes; done poorly, it can wreak havoc on organizations, corporate cultures, and markets.

Technology Due Diligence: Best Practices for Chief Information Officers, Venture Capitalists, and Technology Vendors...

Network Infrastructure Security
Network Infrastructure Security
Research on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity as explored through cryptograph algorithms, digital signature, authentication code, etc. Unlike other books on network information security, Network Infrastructure...
Oracle Essbase 9 Implementation Guide
Oracle Essbase 9 Implementation Guide

The hot new data analysis trends involve business intelligence and analytics. The technology that supports business intelligence and analytics better than anything else is today's multidimensional OLAP technology - and there is none better than Oracle Essbase! Although storing data in a cube and developing analytical applications leaves...

LPIC-1: Linux Professional Institute Certification Study Guide: (Exams 101 and 102)
LPIC-1: Linux Professional Institute Certification Study Guide: (Exams 101 and 102)
Offering you thorough coverage of the new version of the leading Linux certification from Linux Professional Institute (LPI), this book covers both objectives and materials tested in the two required LPIC-1 exams: LPI 101 and LPI 102. You’ll certainly appreciate the clear, concise information on key exam topics, including using Linux command...
Deafness and Challenging Behaviour: The 360° Perspective
Deafness and Challenging Behaviour: The 360° Perspective

Challenging behaviours, such as aggression and violence, are more common in deaf people than hearing people. Filling a crucial gap in the international market, this book will appeal equally to those who work occasionally or entirely with Deaf or hearing impaired client groups of all ages.

Multi-disciplinary professionals with...

CNA Certified Nursing Assistant Exam Cram
CNA Certified Nursing Assistant Exam Cram

Succeed with topical reviews, practice exams, and preparation tools

 

·        Covers exactly what you need to know to score higher on your CNA exam

...

Making WIN32 Applications Mobile
Making WIN32 Applications Mobile
A key resource to learn how to repurpose Windows applications for handheld devices

When handheld computers were power-hungry and memory-poor, synchronizing calendars and perhaps reading e-mail were all the applications most people needed. Now that handhelds have more power than first-generation desktop computers, the opportunity to do more than...

How to Do Everything with Web 2.0 Mashups
How to Do Everything with Web 2.0 Mashups
Few developments in the world of computers have been embraced as quickly as mashups. The most common mashups remain those that build on the various mapping APIs, but dynamic combinations of data from multiple sources or in multiple formats (the basic definition of a mashup) are all over the Web. Part I of this book provides an introduction to the...
Algorithm Design for Networked Information Technology Systems
Algorithm Design for Networked Information Technology Systems

Networked information technology (NIT) systems are synonymous with network-centric or net-centric systems and constitute the cornerstone of the fast-growing information age. NIT systems' field of application ranges from the traditional worldwide telecommunication systems, banking and financial transactions, on-line travel reservation...

unlimited object storage image
Result Page: 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54 53 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy