Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Uncertainty in the Electric Power Industry: Methods and Models for Decision Support
Uncertainty in the Electric Power Industry: Methods and Models for Decision Support
Starting in Chile, the UK and Norway, liberalization and privatization
have been a major theme in the electricity industry during the last decade.

Through the introduction of competition and economic considerations,
governments around the world have attempted to obtain more reliable and
cheaper services for the electricity
...
XML Programming  (Core Reference)
XML Programming (Core Reference)

When first exposed to the Extensible Markup Language (XML), you might ask yourself how it fits in the overall picture of Web-related items. This is the same question developers, managers, and presidents ask, not only of their peers, but of themselves as well. Ironically, this is the same question people in those roles asked themselves years ago...

jQuery UI 1.8: The User Interface Library for jQuery
jQuery UI 1.8: The User Interface Library for jQuery

Modern web application user interface design requires rapid development and proven results. jQuery UI, a trusted suite of official plugins for the jQuery JavaScript library, gives you a solid platform on which you can build rich and engaging interfaces with maximum compatibility, stability, and a minimum of time and effort.

jQuery...

InfoSecurity 2008 Threat Analysis
InfoSecurity 2008 Threat Analysis
An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess...
Seduction: A History From the Enlightenment to the Present
Seduction: A History From the Enlightenment to the Present

A brilliantly original history that explores the shifting cultural mores of courtship, told through the lives of remarkable women and men throughout history.

If sex has generally been a private matter, seduction has always been of intense public interest. Whether the stuff of front-page tabloid news, the
...
Microsoft Dynamics NAV 7 Programming Cookbook
Microsoft Dynamics NAV 7 Programming Cookbook

Learn to customize, integrate and administer NAV 7 using practical, hands-on recipes

Overview

  • Integrate NAV with external applications, using the C/AL or SQL server
  • Develop .NET code to extend NAV programming possibilities
  • Administer the Microsoft NAV 7 server and...
Secure Computer and Network Systems: Modeling, Analysis and Design
Secure Computer and Network Systems: Modeling, Analysis and Design

Secure Computer and Network Systems

Modeling, Analysis and Design

Nong Ye, Arizona State University, USA

Computer and network systems have given us unlimited opportunities of reducing cost, improving efficiency, and increasing revenues, as demonstrated by...

Web2py Enterprise Web Framework, 2nd Ed
Web2py Enterprise Web Framework, 2nd Ed

I am guilty! After publicly complaining about the existence of too many Python based web frameworks, after praising the merits of Django, Pylons, TurboGears, CherryPy, and web.py, after having used them professionally and taught them in University level courses, I could not resist and created one more: web2py.

Why did I...

Handbook of Biological Effects of Electromagnetic Fields, Fourth Edition - Volume 2: Handbook of Biological Effects of Electromagnetic Fields, Fourth ... Fields, Fourth Edition (Volume 2)
Handbook of Biological Effects of Electromagnetic Fields, Fourth Edition - Volume 2: Handbook of Biological Effects of Electromagnetic Fields, Fourth ... Fields, Fourth Edition (Volume 2)

The volume of this new edition of the Handbook cover the basic biological, medical, physical, and electrical engineering principles. They also include experimental results concerning how electric and magnetic fields affect biological systems?both as potential hazards to health and potential tools for medical treatment and scientific...

How to Cheat at Configuring Open Source Security Tools
How to Cheat at Configuring Open Source Security Tools
The Perfect Reference for the Multitasked SysAdmin

This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and
...
Intelligent Systems: Approximation by Artificial Neural Networks (Intelligent Systems Reference Library)
Intelligent Systems: Approximation by Artificial Neural Networks (Intelligent Systems Reference Library)

This brief monograph is the first one to deal exclusively with the quantitative approximation by artificial neural networks to the identity-unit operator. Here we study with rates the approximation properties of the "right" sigmoidal and hyperbolic tangent artificial neural network positive linear operators. In particular we study...

Fault Location on Power Networks (Power Systems)
Fault Location on Power Networks (Power Systems)

Electric power systems will always be exposed to the failure of their components. When a fault occurs on a line, it is crucial for the fault location to be identified as accurately as possible, allowing the damage caused by the fault to be repaired quickly before the line is put back into service. Fault Location on Power Lines enables...

unlimited object storage image
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy