Home | Amazing | Today | Tags | Publishers | Years | Search 
Image-Based Geometric Modeling and Mesh Generation (Lecture Notes in Computational Vision and Biomechanics)
Image-Based Geometric Modeling and Mesh Generation (Lecture Notes in Computational Vision and Biomechanics)

As a new interdisciplinary research area, “image-based geometric modeling and mesh generation” integrates image processing, geometric modeling and mesh generation with finite element method (FEM) to solve problems in computational biomedicine, materials sciences and engineering. It is well known that FEM is currently...

Optimizing Firm Performance: Alignment of Operational Success Drivers on the Basis of Empirical Data (Schriften zum europäischen Management)
Optimizing Firm Performance: Alignment of Operational Success Drivers on the Basis of Empirical Data (Schriften zum europäischen Management)

​Academic research has identified several operational drivers in manufacturing companies that have an effect on either the physical production of goods or its distribution: working capital requirements, manufacturing performance, supply chain performance and supply chain risk. Despite the fact that these four operational drivers have...

Inspire!: Why Customers Come Back
Inspire!: Why Customers Come Back

8 POWERFUL WAYS TO INSPIRE TODAY’S TOUGH CUSTOMERS IN TOUGH TIMES AND MAKE THEM STICK!

 

“With Jim Champy’s well-proven gift for keen management analysis, today’s essential notions of business...

Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information
Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information

Use this book to learn how to conduct a timely and thorough Risk Analysis and Assessment documenting all risks to the confidentiality, integrity, and availability of electronic Protected Health Information (ePHI), which is a key component of the HIPAA Security Rule. The requirement is a focus area for the Department of Health and Human...

The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)
The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)

Actionable guidance and expert perspective for real-world cybersecurity

The Cyber Risk Handbook is the practitioner's guide to implementing, measuring and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world...

Ultra-Fast Fiber Lasers: Principles and Applications with MATLAB® Models (Optics and Photonics)
Ultra-Fast Fiber Lasers: Principles and Applications with MATLAB® Models (Optics and Photonics)

Ultrashort pulses in mode-locked lasers are receiving focused attention from researchers looking to apply them in a variety of fields, from optical clock technology to measurements of the fundamental constants of nature and ultrahigh-speed optical communications. Ultrashort pulses are especially important for the next generation of...

Numerical Computing with Python: Harness the power of Python to analyze and find hidden patterns in the data
Numerical Computing with Python: Harness the power of Python to analyze and find hidden patterns in the data

Understand, explore, and effectively present data using the powerful data visualization techniques of Python

Key Features

  • Use the power of Pandas and Matplotlib to easily solve data mining issues
  • Understand the basics of statistics to build powerful predictive data...
Strategic Employee Communication: Building a Culture of Engagement
Strategic Employee Communication: Building a Culture of Engagement

Employee engagement (or a lack thereof) can often be linked to poor communication and a detachment from company goals. Companies of all sizes are looking for ways to boost communication, recognizing its impact on key business outcomes, such as productivity and profitability.

This book offers fresh insights about...

Hidden Treasures in Contemporary RNA Sequencing (SpringerBriefs in Computer Science)
Hidden Treasures in Contemporary RNA Sequencing (SpringerBriefs in Computer Science)
Advances in RNA-sequencing (RNA-seq) technologies have provided an unprecedented opportunity to explore the gene expression landscape across individuals, tissues, and environments by efficiently profiling the RNA sequences present in the samples. When a reference genome sequence or a transcriptome of the sample is available,...
Living in Flow: The Science of Synchronicity and How Your Choices Shape Your World
Living in Flow: The Science of Synchronicity and How Your Choices Shape Your World
Harness the principles of synchronicity and flow to live better, work smarter, and find purpose in your life

When we align with circumstance, circumstance aligns with us. Using a cutting-edge scientific theory of synchronicity, Sky Nelson-Isaacs presents a model for living "in the flow"--a state of optimal
...
The Power Source: The Hidden Key to Ignite Your Core, Empower Your Body, Release Stress, and Realign Your Life
The Power Source: The Hidden Key to Ignite Your Core, Empower Your Body, Release Stress, and Realign Your Life
Celebrity trainer and goop expert Lauren Roxburgh's program that uses pelvic floor strength to release stress, fortify the body, and treat the physical and mental origins of tension.


Chances are your body feels some form of stress every day, whether it's inflammation, bloating,
...
Sustainable Development Goals and Institutions of Higher Education (Sustainable Development Goals Series)
Sustainable Development Goals and Institutions of Higher Education (Sustainable Development Goals Series)

This volume brings together both theoretical and case study based contributions to the implementation of the Sustainable Development Goals (SDGs) in Institutions of Higher Education (IHE), presenting an impactful combination of authors from both developing and developed...

Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy