Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computational Acoustics of Noise Propagation in Fluids - Finite and Boundary Element Methods
Computational Acoustics of Noise Propagation in Fluids - Finite and Boundary Element Methods
Among numerical methods applied in acoustics, the Finite Element Method (FEM)  is normally favored for interior problems whereas the Boundary Element Method (BEM) is quite popular for exterior ones.

That is why this valuable reference provides a complete survey of methods for computational acoustics, namely FEM and BEM. It demonstrates...

Telecom Crash Course, Second Edition
Telecom Crash Course, Second Edition
THE DEFINITIVE TELECOM RESOURCE -- COMPLETELY REVISED AND UPDATED

Get a thorough introduction to the telecommunications industry -- from the technologies involved to the complex business, market, and regulatory relationships. This new edition of the acclaimed telecom guide provides a framework for understanding the concepts,...

Real Analysis: A Historical Approach (Pure and Applied Mathematics)
Real Analysis: A Historical Approach (Pure and Applied Mathematics)

A provocative look at the tools and history of real analysis

This new edition of Real Analysis: A Historical Approach continues to serve as an interesting read for students of analysis. Combining historical coverage with a superb introductory treatment, this book helps readers easily make the transition from concrete...

The Dual of L(X,L), Finitely Additive Measures and Weak Convergence: A Primer (SpringerBriefs in Mathematics)
The Dual of L(X,L), Finitely Additive Measures and Weak Convergence: A Primer (SpringerBriefs in Mathematics)

In measure theory, a familiar representation theorem due to F. Riesz identifies the dual space Lp(X,L,λ)* with Lq(X,L,λ), where 1/p+1/q=1, as long as 1 ≤ p<∞. However, L(X,L,λ)* cannot be similarly described, and is instead represented as a...

Probability and Random Processes for Electrical and Computer Engineers
Probability and Random Processes for Electrical and Computer Engineers
The theory of probability is a powerful tool that helps electrical and computer engineers to explain, model, analyze, and design the technology they develop. The text begins at the advanced undergraduate level, assuming only a modest knowledge of probability, and progresses through more complex topics mastered at graduate level. The first five...
Handbook of Research on Wireless Multimedia: Quality of Service and Solutions
Handbook of Research on Wireless Multimedia: Quality of Service and Solutions
The recent rapid advances in wireless technologies have created a demand for high quality multimedia applications and services. These advanced multimedia applications give rise to a new set of challenges in providing Quality of Service (QoS) when delivering these services over wireless networks.

The Handbook of Research on Wireless...

Roaming in Wireless Networks (Communications Engineering)
Roaming in Wireless Networks (Communications Engineering)
Mobility is the key to the success of wireless networks. Roaming has extended the definition of mobility beyond the technology, network, and country boundaries. Is not it fascinating to make or receive calls anywhere in the world using the same phone and identity? International roaming is already proven to be one of the most popular features of...
Service Provision: Technologies for Next Generation Communications
Service Provision: Technologies for Next Generation Communications
This book provides the first overview of the service technologies available to telecoms operators working in a post-convergence world. Previous books have focused either on computer networks or on telecoms networks. This is the first to bring the two together and provide a single reference source for information that is currently only to be found...
Controller-Based Wireless LAN Fundamentals: An end-to-end reference guide to design, deploy, manage, and secure 802.11 wireless networks
Controller-Based Wireless LAN Fundamentals: An end-to-end reference guide to design, deploy, manage, and secure 802.11 wireless networks

As wired networks are increasingly replaced with 802.11n wireless connections, enterprise users are shifting to centralized, next-generation architectures built around Wireless LAN Controllers (WLC). These networks will increasingly run business-critical voice, data, and video applications that once required wired...

EIGRP Network Design Solutions: The Definitive Resource for EIGRP Design, Deployment, and Operation
EIGRP Network Design Solutions: The Definitive Resource for EIGRP Design, Deployment, and Operation
EIGRP Network Design Solutions provides readers with in-depth knowledge of EIGRP, the Cisco routing protocol that runs many large enterprise and service provider networks. It covers the theory of EIGRP, network design issues, configuration of EIGRP on Cisco IOS routers, and detailed troubleshooting information. Case studies and configuration...
Inescapable Data: Harnessing the Power of Convergence
Inescapable Data: Harnessing the Power of Convergence

As communications, computing, and data storage converge, data is becoming utterly ubiquitous...and that changes everything. In this book, two leading data management visionaries reveal how data transforms the way you do business, the technologies you use, the investments you make, the life you live, and the world you live in.

Chris...

Data and Applications Security XVII: Status and Prospects
Data and Applications Security XVII: Status and Prospects
Security and privacy are paramount concerns in information processing systems, which are vital to business, government and military operations and, indeed, society itself. Meanwhile, the expansion of the Internet and its convergence with telecommunication networks are providing incredible connectivity, myriad applications and, of course, new...
unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy