Home | Amazing | Today | Tags | Publishers | Years | Search 
Wireless Communications Design Handbook: Space Interference
Wireless Communications Design Handbook: Space Interference
During the decade of the !970s and even in the early 1980s, satellite communications was basically analog (though digital was already in the drawing board), and most satellites were huge, bulky, and in geosynchronous orbit. Most of the satellites in lower orbits were either military or scientific in nature~ Things have changed within the past five...
FPGA Prototyping ByVerilog Examples: Xilinx Spartan-3 Version
FPGA Prototyping ByVerilog Examples: Xilinx Spartan-3 Version

HDL (hardware description language) and FPGA (field-programmable gate array) devices allow designers to quickly develop and simulate a sophisticated digital circuit, realize it on a prototyping device, and verify operation of the physical implementation. As these technologies mature, they have become mainstream practice. We can now use a PC and...

Hacking the Xbox: An Introduction to Reverse Engineering
Hacking the Xbox: An Introduction to Reverse Engineering
This--this being the attitude encapsulated in Andrew "bunnie" Huang's Hacking the Xbox--is why a lot of people got into the computer industry in the first place. These people liked taking things apart and figuring out how they worked, then making them serve purposes they weren't originally designed for and sharing the new discoveries with...
PHP Object-Oriented Solutions
PHP Object-Oriented Solutions
With the surge of popularity of PHP 5, and with PHP 6 just around the corner, Object-Oriented Programming is now an important consideration for PHP developers. This version-neutral book is a gentle introduction to Object-Oriented Programming (OOP) that wont overburden you with complex theory. It teaches you the essential basics of OOP that youll...
Wireless Internet Security: Architecture and Protocols
Wireless Internet Security: Architecture and Protocols
In describing tools for internet security, this title focuses on understanding the system architecture of existing security and on developing architectural changes for new security services. Topics include security threats in wireless networks, security services for countering those threats, and the process of defining functional architecture for...
FPGAs: Instant Access
FPGAs: Instant Access
Various aspects of PLDs, ASICs, and FPGAs will be discussed later in more detail. For now, we need only be aware that PLDs are devices whose i nternal architecture is predetermined by the manufacturer, but are created in such a way that they can be configured by engineers in the field to perform a variety of different functions. In comparison to an...
Voice and Audio Compression for Wireless Communications
Voice and Audio Compression for Wireless Communications
"I recommend this book as a useful reference on voice and audio compression for wireless communication." (Computing Reviews, June 10, 2008)

Voice communications remains the most important facet of mobile radio services, which may be delivered over conventional fixed links, the Internet or wireless channels. This
...
Fundamentals of Digital Imaging
Fundamentals of Digital Imaging
The multi-billion dollar industry of digital imaging technology is an active research area with applications in our everyday lives in products such as digital cameras, scanners, printers and display systems. This book presents an introduction to the fundamentals of digital imaging, with emphasis on the basic operations of image capture and display...
Software Engineering: Effective Teaching and Learning Approaches and Practices (Premier Reference Source)
Software Engineering: Effective Teaching and Learning Approaches and Practices (Premier Reference Source)
Over the past decade, software engineering has developed into a highly respected field. Though computing and software engineering education continues to emerge as a prominent interest area of study, few books specifically focus on software engineering education itself.

Software Engineering: Effective Teaching and Learning Approaches and...

Energy Management Handbook, Sixth Edition
Energy Management Handbook, Sixth Edition
When the fi rst introduction to Energy Management Handbook was written in 1982, I was in college, worried more about how to repay student loans than anything else. But this is now.

This book lives to serve its readers. In helping to edit the book, it has been my goal to keep the material fresh, pertinent and useful. My approach has been
...
Basic Photographic Materials and Processes, Third Edition
Basic Photographic Materials and Processes, Third Edition
"This is the most understandable broad coverage of the material on the market... I will continue using this title until next edition or if another publisher comes out with a better title (but I doubt that)."

"No question, content wise this one tops most pubs on the subject."

"Having taken the
...
Security in Wireless Mesh Networks (Wireless Networks and Mobile Communications)
Security in Wireless Mesh Networks (Wireless Networks and Mobile Communications)
Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is characterized by dynamic self-organization, self-configuration, and self-healing to enable flexible integration, quick deployment, easy maintenance, low costs, high scalability, and reliable services....
Result Page: 812 811 810 809 808 807 806 805 804 803 802 801 800 799 798 797 796 795 794 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy