Home | Amazing | Today | Tags | Publishers | Years | Search 
Air and Spaceborne Radar Systems (Radar, Sonar, Navigation and Avionics)
Air and Spaceborne Radar Systems (Radar, Sonar, Navigation and Avionics)

The history of airborne radar is almost as old as that of radar itself. The improvement in detection range provided by an airborne platform was realised early during the Second World War, and the development of the cavity magnetron at almost the same time allowed higher radar frequencies and, hence, directive antennas to be used. Nowadays,...

An Experimental Approach to CDMA and Interference Mitigation: From System Architecture to Hardware Testing through VLSI Design
An Experimental Approach to CDMA and Interference Mitigation: From System Architecture to Hardware Testing through VLSI Design

The key of a successful approach to the complex issue of designing wireless terminals for present and future communication systems (usually addressed to as '3rd Generation and beyond') lies in a single 'magic' word: multidisciplinarity. This was actually the philosophy which inspired and drove a fruitful teamwork performed at...

The Game Maker's Companion
The Game Maker's Companion

The Game Maker’s Companion is the long-awaited sequel to The Game Maker’s Apprentice. This book picks up where the last book left off, advancing your game development journey with some seriously impressive gaming projects. This time you’ll learn how to make professional-quality platform games with solid...

Network Security: A Decision and Game-Theoretic Approach
Network Security: A Decision and Game-Theoretic Approach

Covering attack detection, malware response, algorithm and mechanism design, privacy, and risk management, this comprehensive work applies unique quantitative models derived from decision, control, and game theories to understanding diverse network security problems. It provides the reader with a system-level theoretical understanding of...

Handbook of Plastic Optics
Handbook of Plastic Optics

This volume is the only book to describe in detail all aspects of plastic optics from design issues to production technology and quality control aspects. Throughout, the focus is firmly set on practical applications, making this an indispensable source of information for all those working in optics research and development.

Topics...

Coping with Interference in Wireless Networks (Signals and Communication Technology)
Coping with Interference in Wireless Networks (Signals and Communication Technology)

Unlike wired networks where transmitters have no effect on receivers other than their own, in wireless networks we are limited by interference. The traditional routing methods are not optimal any more when it comes to a wireless medium. The maximum data rate on each link depends not only on the power in that link but also on the transmitted...

Hands-On Guide to Flash Video: Web Video and Flash Media Server (Hands-On Guide Series)
Hands-On Guide to Flash Video: Web Video and Flash Media Server (Hands-On Guide Series)

The Hands-On Guide to Flash Video is a professional reference book written by industry experts that are currently helping professionals produce Web video and implement Flash Media Server. This book covers Flash Video production from soup to nuts, beginning with how to configure your camcorder and ending to advanced server techniques like...

Winning Design!: LEGO MINDSTORMS NXT Design Patterns for Fun and Competition
Winning Design!: LEGO MINDSTORMS NXT Design Patterns for Fun and Competition

Winning Design! LEGO Mindstorms NXT Design Patterns for Fun and Competition is about design that works. It’s about building with LEGO MINDSTORMS NXT for fun, for education, but especially for competition. Author James Trobaugh is an experienced coach and leader in the FIRST LEGO League. In this book, he shares his hard-won...

Hardening Cisco Routers (O'Reilly Networking)
Hardening Cisco Routers (O'Reilly Networking)

Master one single topic, and everything becomes clearer.

The field of network security is a huge subject. To be a network security expert, you must be an expert on routers, switches, hubs, firewalls, intrusion detection systems (IDS), servers, desktops, email, HTTP, instant messages, sniffers, and a thousand other topics. There are...

Handbook of Face Recognition
Handbook of Face Recognition

Face recognition has a large number of applications, including security, person verification, Internet communication, and computer entertainment. Although research in automatic face recognition has been conducted since the 1960s, this problem is still largely unsolved. Recent years have seen significant progress in this area owing to advances...

Machine Learning for Vision-Based Motion Analysis: Theory and Techniques
Machine Learning for Vision-Based Motion Analysis: Theory and Techniques

Techniques of vision-based motion analysis aim to detect, track, identify, and generally understand the behavior of objects in image sequences. With the growth of video data in a wide range of applications from visual surveillance to human-machine interfaces, the ability to automatically analyze and understand object motions from video...

Design Methods and Applications for Distributed Embedded Systems
Design Methods and Applications for Distributed Embedded Systems

The ever decreasing price/performance ratio of microcontrollers makes it economically attractive to replace more and more conventional mechanical or electronic control systems within many products by embedded real-time computer systems. An embedded real-time computer system is always part of a well-specified larger system, which we call an...

Result Page: 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy