Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
How to Build a Business Rules Engine: Extending Application Functionality through Metadata Engineering
How to Build a Business Rules Engine: Extending Application Functionality through Metadata Engineering
Business rules engines can make organizations more agile by allowing them to manage diverse sets of operating rules, such as many different contracts for goods and services with different clients. For example, business rules engines can contain interfaces that allow users to define business rules to add specific functionality to software...
Acoustic Diffusers and Absorbers: Theory, Design and Application
Acoustic Diffusers and Absorbers: Theory, Design and Application
Every book tells a story and there is a story behind every book. This story begins in 1980, in the conference room of the laboratory for the structure of matter at the Naval Research Laboratory (NRL) in Washington, DC, where Peter D’Antonio was employed as a diffraction physicist. Knowing Peter’s interest in music, a colleague handed...
Home Recording Studio  Build it Like the Pros
Home Recording Studio Build it Like the Pros
With the advances in digital technology, musicians can now produce their own music. But the gear is only part of the equation when it comes to recording and mixing. The next part is finding a soundproof room that you can produce it in. Unfortunately, any old room in your house will not suffice for a quality recording. Without a decent room, you'l...
Parallel Algorithm Derivation and Program Transformation
Parallel Algorithm Derivation and Program Transformation
Transformational programming and parallel computation are two emerging fields that may ultimately depend on each other for success. Perhaps because ad hoc programming on sequential machines is so straightforward, sequential programming methodology has had little impact outside the academic community, and transformational methodology has had little...
Human Ear Recognition by Computer (Advances in Pattern Recognition)
Human Ear Recognition by Computer (Advances in Pattern Recognition)

Biometrics deals with recognition of individuals based on their physiological or behavioral characteristics. The human ear is a new feature in biometrics that has several merits over the more common face, fingerprint and iris biometrics. Unlike the fingerprint and iris, it can be easily captured from a distance without a fully cooperative...

Design Methods and Applications for Distributed Embedded Systems
Design Methods and Applications for Distributed Embedded Systems

The ever decreasing price/performance ratio of microcontrollers makes it economically attractive to replace more and more conventional mechanical or electronic control systems within many products by embedded real-time computer systems. An embedded real-time computer system is always part of a well-specified larger system, which we call an...

RFID Systems: Research Trends and Challenges
RFID Systems: Research Trends and Challenges

This book provides an insight into the 'hot' field of Radio Frequency Identification (RFID) Systems

In this book, the authors provide an insight into the field of RFID systems with an emphasis on networking aspects and research challenges related to passive Ultra High Frequency (UHF) RFID systems. The book reviews...

Handbook of Software Engineering and Knowledge Engineering: Recent Advances
Handbook of Software Engineering and Knowledge Engineering: Recent Advances

The Handbook of Software Engineering and Knowledge Engineering is the first comprehensive handbook covering these two important areas that have become interwoven in recent years. Many international experts contribute to this Hand book. Each article is written in a way that a practitioner of software engineering and knowledge engineering can...

Concepts of Chemical Engineering 4 Chemists (RSC '4' Chemists)
Concepts of Chemical Engineering 4 Chemists (RSC '4' Chemists)

This book is meant as a handbook and resource guide for chemists (and other scientists) who either find themselves working alongside chemical engineers or who are undertaking chemical engineering-type projects and who wish to communicate with their colleagues and understand chemical engineering principles. The book has arisen out of...

Introduction to Biometrics
Introduction to Biometrics
A number of crucial societal applications like international border crossing, electronic commerce, and welfare disbursement require reliable person recognition systems. Traditional person authentication methods based on passwords and identity documents often fail to meet the stringent security and performance demands of these...
Metasploit Penetration Testing Cookbook
Metasploit Penetration Testing Cookbook

Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes...

Surface Acoustic Wave Devices and Their Signal Processing Applications
Surface Acoustic Wave Devices and Their Signal Processing Applications
The suggestion for writing this book came from my long-time friend, Professor Colin diCenzo, FIEEE, to whom I owe many thanks for his encouragement. The outline of the book was started many years ago, as a somewhat sparse series o f lecture notes that I used in support of an electrical engineering graduate course at McMaster...
unlimited object storage image
Result Page: 410 409 408 407 406 405 404 403 402 401 400 399 398 397 396 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy