Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Conspiracy in Camelot: The Complete History of the Assassination of John Fitzgerald Kennedy
Conspiracy in Camelot: The Complete History of the Assassination of John Fitzgerald Kennedy
Those not already deeply immersed in recondite Kennedy assassination lore will find this offering by Kroth-an associate professor of counseling psychology at Santa Clara University, and a contributor to CounterPunch, a biweekly "muckraking newsletter"-well over the top. Advertised as an "objective" look at the myriad conspiracy...
Encyclopedia of Mobile Computing and Commerce
Encyclopedia of Mobile Computing and Commerce
Nowadays, mobile communication, mobile devices, and mobile computing are widely available. Everywhere people are carrying mobile devices, such as mobile phones. The availability of mobile communication networks has made a huge impact to various applications, including commerce. Consequently, there is a strong relationship between mobile computing...
Mechanical Behaviour of Engineering Materials: Metals, Ceramics, Polymers, and Composites
Mechanical Behaviour of Engineering Materials: Metals, Ceramics, Polymers, and Composites
Components used in mechanical engineering usually have to bear high mechanical loads. It is, thus, of considerable importance for students of mechanical engineering and materials science to thoroughly study the mechanical behaviour of materials. There are different approaches to this subject: The engineer is mainly interested in design rules to...
SolidWorks 2010: No Experience Required
SolidWorks 2010: No Experience Required

Whether you are a new user of SolidWorks or a professional who wants to improve your skills, this book was written for you. Learning any software can be difficult at times. You launch the software for the first time, and you feel overwhelmed, not knowing how to even start a new document. In 3D CAD programs, it can be especially difficult....

Python and HDF5
Python and HDF5

Gain hands-on experience with HDF5 for storing scientific data in Python. This practical guide quickly gets you up to speed on the details, best practices, and pitfalls of using HDF5 to archive and share numerical datasets ranging in size from gigabytes to terabytes.

Through real-world examples and practical exercises,...

Quantum Magnetism (Lecture Notes in Physics)
Quantum Magnetism (Lecture Notes in Physics)
Putting the quantum into magnetism might, at first sight, seem like stating the obvious; the exchange interactions leading to collective magnetic behavior are, after all, a pure quantum effect. Yet, for many phenomena in magnetism this underlying quantum nature may be safely ignored at least on the qualitative level. The investigation of magnetic...
The Universal Book of Mathematics: From Abracadabra to Zeno's Paradoxes
The Universal Book of Mathematics: From Abracadabra to Zeno's Paradoxes

What makes a number weird, and why, as far as anyone can tell, aren’t weird numbers odd? What do monsters, moonshine, and 24-dimensional oranges have in common? Why couldn’t Sam Loyd get a patent for his famous fifteen puzzle? What is the significance of the statement "the smallest number not nameable in under ten words"?...

Handbook of Cosmetic Science and Technology, Third Edition
Handbook of Cosmetic Science and Technology, Third Edition

Thanks to the contribution of leading experts in cosmetology, the first editions of the Handbook were successful and received excellent reviews. The editors appreciate the excellent author contributions.

The first edition, published in 2001, reviewed the multiple facets of the cosmetic field including the physiology of...

Biometric User Authentication for IT Security: From Fundamentals to Handwriting (Advances in Information Security)
Biometric User Authentication for IT Security: From Fundamentals to Handwriting (Advances in Information Security)
Biometric user authentication techniques have evoked an enormous interest by science, industry and society in the recent past. Scientists and developers have constantly pursued the technology for automated determination or confirmation of the identity of subjects based on measurements of physiological or behavioral traits of humans. Many biometric...
Differential Equations with Linear Algebra
Differential Equations with Linear Algebra

Linearity plays a critical role in the study of elementary differential equations; linear differential equations, especially systems thereof, demonstrate a fundamental application of linear algebra. In Differential Equations with Linear Algebra, we explore this interplay between linear algebra and differential equations and examine...

Data Mining In Time Series Databases (Series in Machine Perception and Artificial Intelligence)
Data Mining In Time Series Databases (Series in Machine Perception and Artificial Intelligence)
Traditional data mining methods are designed to deal with “static” databases, i.e. databases where the ordering of records (or other database objects) has nothing to do with the patterns of interest. Though the assumption of order irrelevance may be sufficiently accurate in some applications, there are certainly many other cases, where...
Mathematical Tools for Data Mining: Set Theory, Partial Orders, Combinatorics (Advanced Information and Knowledge Processing)
Mathematical Tools for Data Mining: Set Theory, Partial Orders, Combinatorics (Advanced Information and Knowledge Processing)
The maturing of the field of data mining has brought about an increased level of mathematical sophistication. Such disciplines like topology, combinatorics, partially ordered sets and their associated algebraic structures (lattices and Boolean algebras), and metric spaces are increasingly applied in data mining research. This book presents these...
unlimited object storage image
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy