Home | Amazing | Today | Tags | Publishers | Years | Search 
Digital Signal and Image Processing Using MATLAB (ISTE)
Digital Signal and Image Processing Using MATLAB (ISTE)

Simulation is an essential tool in any field related to engineering techniques, whether it is used lor teaching purposes or in research and development. When teaching technical subjects, lab works play an important role, as im portant as exercise sessions in helping students assimilate theory. The recent introduction of simulation...

Oracle BI Publisher 11g: A Practical Guide to Enterprise Reporting
Oracle BI Publisher 11g: A Practical Guide to Enterprise Reporting

In the last 15 years, some of us have witnessed mail becoming e-mail, grocery stores becoming www.store, and step-by-step technology becoming part of our daily life. Technology development has radically changed the enterprise's way of doing business. First, daily tasks such as sales, client, and vendor management became...

HTI+ Exam Cram 2
HTI+ Exam Cram 2

Welcome to the Home Technology Integrator (HTI+) Exam Cram 2! This book is designed to help you prepare to take—and pass—the Computing Technology Industry Association (CompTIA) certification exams HT0-101, "Residential Systems," and HT0-102, "Systems Infrastructure and Integration." This...

HTML5 Mastery: Semantics, Standards, and Styling
HTML5 Mastery: Semantics, Standards, and Styling

Unless you have been off on a digital-free holiday, you’ve heard a lot of chatter about HTML5. As a web professional, it is apparent that having an understanding of HTML5 is not only beneficial—it’s essential. The future of the Web has radically changed course in the last few years from XHTML to HTML5, which means...

Practical Arduino Engineering
Practical Arduino Engineering

Arduino boards have impressed both hackers and professional engineers. Whether you're a hobbyist or a professional, it isn't just a breadboard and a hazy idea that keeps you going. It's essential to institute a proper design, device instrumentation and, indeed, test your project thoroughly before committing to a...

Principles of Data Structures Using C and C++
Principles of Data Structures Using C and C++

It gives me immense pleasure in presenting the first edition of the book-Principles of DATA STRUCTURES Using C and C++ which is a unique text valuable for professionals that covers both theoretical and practical aspects of the data structures.

The study of data structures is an essential subject of every under graduate and...

Programming Many-Core Chips
Programming Many-Core Chips

Parallel computing has been confined, for much of its over 40 year history, to highly specialized, technology-wise advanced domains such as scientific computing or telecommunications. There were only a few experts who had the background and experience to write efficient, robust and scalable programs for these parallel machines.

...

Computer Algorithms
Computer Algorithms

If wo try to identify those contributions of computer science which will be long lasting, surely one of these will be the refinement of the concept called algorithm. Ever since man invented the idea of a machine which could per form basic mathematical operations, the study of what can be computed and how it can be done well was...

Mathematical Structures for Computer Science: A Modern Treatment of Discrete Mathematics
Mathematical Structures for Computer Science: A Modern Treatment of Discrete Mathematics

The important role that discrete structures plays in computer science is gaining recognition. Computing Curricula 2001 (CC2001), the latest curriculum recommendation for computer- related education, was a joint undertaking of the Institute for Electrical and Electronic Engineers/Computer Society (IEEE/CS) and the Association for...

Cryptography Engineering: Design Principles and Practical Applications
Cryptography Engineering: Design Principles and Practical Applications

The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts.

Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the...

Data Mining and Machine Learning in Cybersecurity
Data Mining and Machine Learning in Cybersecurity

In the emerging era of Web 3.0, securing cyberspace has gradually evolved into a critical organizational and national research agenda inviting interest from a multidisciplinary scientific workforce. There are many avenues into this area, and, in recent research, machine-learning and data-mining techniques have been applied to design,...

Software Reliability Methods (Texts in Computer Science)
Software Reliability Methods (Texts in Computer Science)

This book presents current methods for dealing with software reliability, illustrating the advantages and disadvantages of each method. The description of the techniques is intended for a non-expert audience with some minimal technical background. It also describes some advanced techniques, aimed at researchers and practitioners in software...

Result Page: 368 367 366 365 364 363 362 361 360 359 358 357 356 355 354 353 352 351 350 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy