|
|
|
|
Fuzzy Control SystemsMust reading for anyone interested in acquiring a thorough understanding of fuzzy logic, its role in soft computing, and its application to control and related fields.
-Lotfi A. Zadeh From the Foreword
Fuzzy Control Systems explores one of the most active areas of research involving fuzzy set theory. The... | | Math Toolkit for Real-Time ProgrammingDo big math on small machines Write fast and accurate library functions Master analytical and numerical calculus Perform numerical integration to any order Implement z-transform formulas Need to learn the ins and outs of the fundamental math functions in
Master analytical and numerical calculus with... | | Beginning Google Web Toolkit: From Novice to ProfessionalThe open source, lightweight Google Web Toolkit (GWT) is a framework that allows Java developers to build Rich Internet Applications (RIA), more recently called Ajax applications, in Java. Typically, writing these applications requires a lot of JavaScript development. However, Java and JavaScript are very distinctively different languages (although... |
|
Refrigeration and Air ConditioningThis text pretends the analytical statement of the refrigeration and acondiontioning air jumps straightforward. And today, more than ever, specially in these times in which the environmental concerns are subject of first degree in every corner of the world.
How is it possible maintain the wished equilibrium between comfort and... | | Human-Computer Interaction Fundamentals (Human Factors and Ergonomics)Hailed on first publication as a compendium of foundational principles and cutting-edge research, The Human-Computer Interaction Handbook has become the gold standard reference in this field. Derived from select chapters of this groundbreaking and authoritative resource, Human-Computer Interaction Fundamentals emphasizes... | | The Mac Hacker's HandbookAs more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities. This unique tome is the first book to uncover the flaws in the Mac OS X operating system—and how to deal with them. Written by two white hat... |
|
|
|
|
Result Page: 785 784 783 782 781 780 779 778 777 776 775 774 773 772 771 770 769 768 767 |