Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Measurement Systems And Sensors
Measurement Systems And Sensors
One of the tendencies in measurement technology development is the development of measurement systems. By the measurement systems, we refer to a set of material and organizational resources, as well as programs for information processing, aggregated in order to obtain, transmit, and process measuring data, and to display and...
Transmission Systems Design Handbook for Wireless Networks
Transmission Systems Design Handbook for Wireless Networks

Covers the design and deployment of wireless transmission networks for wireless applications. From principles and design to equipment procurement, project management, and operation, it is an engineering guide with real-life examples of turnkey operations in the wireless networking industry.

...
Systems Bioinformatics: An Engineering Case-Based Approach
Systems Bioinformatics: An Engineering Case-Based Approach
The high-throughput nature of bioinformatics and system biology has made traditional biological methods, which tend to focus one or two molecules at a time, obsolete. It has made engineering and problem solving skills essential to attack the resulting complex, multiscale problems. Certain technologies, such as robotics automation, microfabrication,...
Fourier Transforms in Radar and Signal Processing (Artech House Radar Library)
Fourier Transforms in Radar and Signal Processing (Artech House Radar Library)
Fourier transforms are used widely, and are of particular value in the analysis of single functions and combinations of functions found in radar and signal processing. Still, many problems that could have been tackled by using Fourier transforms may have gone unsolved because they require integration that is difficult and tedious. Now you can solve...
EMI Protection for Communication Systems
EMI Protection for Communication Systems

In recent years, the protection of communication services operating in the same of adjacent channels has become more and more challenging. Communication systems need to be protected from natural and man-made interference. This practical reference provides a through understanding of how to protect communication systems from intentional and...

Privacy Protection and Computer Forensics, Second Edition
Privacy Protection and Computer Forensics, Second Edition
This book deals with security from hostile computer forensics (mostly on
one’s computer, but also on one’s digital camera, fax machine, and related
computer-like electronics), as distinct from network forensics, which in this
context is snooping into users’ online activities. Computer forensics deals
with
...
High-Level Data Fusion
High-Level Data Fusion
Master cutting-edge Level 2 fusion techniques that help you develop powerful situation assessment services with eye-popping capabilities and performance with this trail-blazing resource. The book explores object and situation fusion processes with an appropriate handling of uncertainties, and applies cutting-edge artificial intelligence and...
RFID-Enabled Sensor Design and Applications (Integrated Microsystems)
RFID-Enabled Sensor Design and Applications (Integrated Microsystems)

Radio frequency identification (RFID) is gaining in popularity, especially as we find ourselves in this communications age and headed towards a ubiquitous computing world. Automatic identification systems become an important aspect not just in today’s technology but also as part of our daily life. We need RFID in our cars,...

Innovations in Internetworking (Artech House Telecommunication Library)
Innovations in Internetworking (Artech House Telecommunication Library)
Choosing the proper boundaries between functions is perhaps the primary activity of the computer system designer. Design principles that provide guidance in this choice of function placement are among the most important tools of a system designer. This paper discusses one class of function placement argument that has been used for...
Critical Chain Project Management (Artech House Professional Development Library)
Critical Chain Project Management (Artech House Professional Development Library)
Plan and manage projects that yield successful results all the time in half the time you?re used to with this new guide. Providing the theory, tools and techniques you need to implement critical chain project management in your organization, you learn how to reduce stress on a project team, eliminate cost and scheduling over-runs, effectively...
Defense and Detection Strategies against Internet Worms
Defense and Detection Strategies against Internet Worms
This is the first book focused exclusively on Internet worms, offering you solid worm detection and mitigation strategies for your work in the field. This ground-breaking volume enables you to put rising worm trends into perspective with practical information in detection and defense techniques utilizing data from live networks, real IP addresses,...
Genome Sequencing Technology and Algorithms
Genome Sequencing Technology and Algorithms
The 2003 completion of the Human Genome Project was just one step in the evolution of DNA sequencing. Now from a "who's who" of pioneers in the field comes the latest genome sequencing and assembly advances that are redefining the field. This trail-blazing work gives researchers unparalleled access to state-of-the-art DNA...
Result Page: 18 17 16 15 14 13 12 11 10 9 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy