Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Multiplexed Networks for Embedded Systems: CAN, LIN, FlexRay, Safe-by-Wire...
Multiplexed Networks for Embedded Systems: CAN, LIN, FlexRay, Safe-by-Wire...

Multiplexed networks are essential for the unified, efficient and cost-effective exchange of electronic information within embedded component systems. This is especially important in automotive manufacturing as vehicles become increasingly reliant on robust electronic networks and systems for improved reliability, anti-lock brake systems (ABS),...

Build Supercomputers with Raspberry Pi 3
Build Supercomputers with Raspberry Pi 3

Key Features

  • Carlos R. Morrison from NASA will teach you to build a supercomputer with Raspberry Pi 3
  • Deepen your understanding of setting up host nodes, configuring networks, and automating mountable drives
  • Learn various math, physics, and engineering applications to solve complex...
Reservoir Engineering Handbook
Reservoir Engineering Handbook
"...this publication provides a comprehensive and up-to-date reference tool for the reservoir engineer or reservoir engineering student. It covers reservoir fluid behaviour and properties, including laboratory analysis and reservoir fluid flow. It provides a guide to predicting oil reservoir performance through analysis of oil recovery...
Bootstrapping Microservices with Docker, Kubernetes, and Terraform: A project-based guide
Bootstrapping Microservices with Docker, Kubernetes, and Terraform: A project-based guide
Summary
The best way to learn microservices development is to build something! Bootstrapping Microservices with Docker, Kubernetes, and Terraform guides you from zero through to a complete microservices project, including fast prototyping, development, and deployment. You’ll get your feet wet using
...
Foundations and Novel Approaches in Data Mining (Studies in Computational Intelligence)
Foundations and Novel Approaches in Data Mining (Studies in Computational Intelligence)
Data-mining has become a popular research topic in recent years for the treatment of the "data rich and information poor" syndrome. Currently, application oriented engineers are only concerned with their immediate problems, which results in an ad hoc method of problem solving. Researchers, on the other hand, lack an understanding of the...
Advances in Evolutionary Algorithms: Theory, Design and Practice
Advances in Evolutionary Algorithms: Theory, Design and Practice
The goal of this book is to develop efficient optimization algorithms to solve diverse real-world problems of graded difficulty. Genetic and evolutionary mechanisms have been deployed for reaching the goal.

This book has made five significant contributions in the realm of genetic and evolutionary computation (GEC).

Practical
...
Applied Fuzzy Arithmetic: An Introduction with Engineering Applications
Applied Fuzzy Arithmetic: An Introduction with Engineering Applications

Applied Fuzzy Arithmetic provides a well-structured compendium that offers both a deeper knowledge about the theory of fuzzy arithmetic and an extensive view on its applications in the engineering sciences, making it a resource for students, researchers, and practical engineers. The first part of the book gives an introduction...

JavaScript Application Cookbook
JavaScript Application Cookbook
Seasoned Java coders will find the JavaScript Application Cookbook compiled just for them. Written in the same vein as the old-style programmer "toolbox" titles, this book sheds the usual tutorial presentation and simply introduces a series of JavaScript applications you can use on your own sites.

The cookbook begins with...

User's Guide To Cryptography And Standards (Artech House Computer Security)
User's Guide To Cryptography And Standards (Artech House Computer Security)
This book is about standards, cryptography, and standards for cryptography. It has been written in the hope that it will
serve a number of purposes, including the following.

◗ Perhaps most importantly, to provide a general introduction
to standardized cryptography for the user of this technology (i.e., a designer or
...
CherryPy Essentials: Rapid Python Web Application Development
CherryPy Essentials: Rapid Python Web Application Development
This book covers the CherryPy library for Python web development from its history and installation through its main features and core concepts to its integration with Python and other products to construct, test, and deploy a sample photoblog application. The author Sylvain Hellegouarch is dedicated to the development of free software projects and...
Computer Algebra and Symbolic Computation: Mathematical Methods
Computer Algebra and Symbolic Computation: Mathematical Methods
Computer algebra is the field of mathematics and computer science that is concerned with the development, implementation, and application of algorithms that manipulate and analyze mathematical expressions. This book and the companion text, Computer Algebra and Symbolic Computation: Mathematical Methods, are an introduction to the subject that...
Visual Perception and Robotic Manipulation: 3D Object Recognition, Tracking and Hand-Eye Coordination
Visual Perception and Robotic Manipulation: 3D Object Recognition, Tracking and Hand-Eye Coordination
As autonomous robots expand into the service domain, new solutions to the challenge of operating in domestic environments must be developed. Widespread adoption of service robots demands high robustness to environmental change and operational wear, and minimal reliance on application specific knowledge. As such, rich sensing modalities such as...
unlimited object storage image
Result Page: 639 638 637 636 635 634 633 632 631 630 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy