Home | Amazing | Today | Tags | Publishers | Years | Search 
Digital Terrain Modeling: Acquisition, Manipulation And Applications
Digital Terrain Modeling: Acquisition, Manipulation And Applications

With its expanding array of applications in everything from biodiversity modeling to wireless communications, it's no wonder digital terrain modeling (DTM) - the electronic process of representing topography in three dimensions -- is a hot subject among engineers and geoscientists. This concise resource is the first truly complete guide...

Role-Based Access Control
Role-Based Access Control

Role-based access control (RBAC) is a technology that is attracting a great deal of attention, particularly for commercial applications, because of its potential for reducing the complexity and cost of security administration in large networked applications. Under RBAC, security administration is greatly simplified by using roles,...

GNSS Receivers for Weak Signals
GNSS Receivers for Weak Signals

Many important GPS applications such as the positioning of wireless devices, tracking during ionospheric scintillation, and orbit determination of geostationary and high Earth orbit satellites require a GNSS (global navigation satellite system) receiver with the ability to work with weak signals. This first-of-its-kind book addresses this...

Laser Space Communications
Laser Space Communications

Laser space communications is a hot topic among electrical engineers working for the government and in the defense industry, and this groundbreaking resource is the first to offer professionals a thorough, practical treatment of the subject. The book focuses on the feasibility of laser space communications between satellites, satellites and...

EMI Protection for Communication Systems
EMI Protection for Communication Systems

In recent years, the protection of communication services operating in the same of adjacent channels has become more and more challenging. Communication systems need to be protected from natural and man-made interference. This practical reference provides a through understanding of how to protect communication systems from intentional and...

SSL and TLS: Theory and Practice (Information Security and Privacy)
SSL and TLS: Theory and Practice (Information Security and Privacy)

SSL (secure socket layer) and TLS (Transport Layer Security) are widely deployed security protocols that are used in all kinds of web-based e-commerce and e-business applications and are part of most contemporary security systems available today. This practical book provides a comprehensive introduction to these protocols, offering you a...

Wireless Sensor Networks for Healthcare Applications
Wireless Sensor Networks for Healthcare Applications

Unlike other books on wireless sensors networks, this unique reference focuses on methods of application, validation and testing based on real deployments of sensor networks in the clinical and home environments. Key topics include healthcare and wireless sensors, sensor network applications, designs of experiments using sensors, data...

Data Mining in Biomedicine Using Ontologies
Data Mining in Biomedicine Using Ontologies

An ontology is a set of vocabulary terms with explicitly stated meanings and relations with other terms. Presently, a growing number of ontologies are being built and used for annotating data in biomedical research. Thanks to the tremendous amount of data being generated, ontologies are now being used in numerous ways, including connecting...

Electromagnetics, Microwave Circuit, And Antenna Design for Communications Engineering, Second Edition
Electromagnetics, Microwave Circuit, And Antenna Design for Communications Engineering, Second Edition

This newly revised, authoritative resource is essential reading for professionals looking for a clear, complete overview of basic electromagnetics principles and applications to antenna and microwave circuit design for communications. Among the numerous updates, the second edition features a brand new chapter on the increasingly important topic...

Wireless Positioning Technologies and Applications (Technology and Applications)
Wireless Positioning Technologies and Applications (Technology and Applications)
At last--here's a comprehensive book that puts full details on all short-range wireless-positioning methods at your command for instant access and use. This one-stop resource surveys each technique's theory of operation, advantages and disadvantages, applicability in different domains, implementation procedures, and accuracy to help you select the...
Successful Evolution of Software Systems
Successful Evolution of Software Systems
In today’s fast-changing, competitive environment, having an up-to-date information system (IS) is critical for all companies and institutions. Rather than creating a new system from scratch, reengineering is an economical way to develop an IS to match changing business needs. Using detailed examples, this practical book gives you methods and...
Space-Time Codes and MIMO Systems
Space-Time Codes and MIMO Systems
This book is intended to introduce space-time coding and multiantenna systems. The endeavor is to impart a working knowledge of the subject not just for students and researchers but for the entire wireless community.

The birth of multiantenna systems is the direct result of the long-standing struggle to achieve data rates without
...
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy