Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Augmented Reality with Kinect
Augmented Reality with Kinect

If you know C/C++ programming, then this book will give you the ability to develop augmented reality applications with Microsoft’s Kinect. By the end of the course you will have created a complete game.

Overview

  • Understand all major Kinect API features including image streaming, skeleton tracking...
Sewing for Fashion Designers
Sewing for Fashion Designers

This comprehensive guide explores all the fundamental sewing methods and introduces professional garment construction.

Chapter One introduces sewing tools and machinery (including industrial machines). It discusses how to work with patterns and explains cutting-out methods. Chapter Two is devoted to different fabrics and how
...

Biometric User Authentication for IT Security: From Fundamentals to Handwriting (Advances in Information Security)
Biometric User Authentication for IT Security: From Fundamentals to Handwriting (Advances in Information Security)
Biometric user authentication techniques have evoked an enormous interest by science, industry and society in the recent past. Scientists and developers have constantly pursued the technology for automated determination or confirmation of the identity of subjects based on measurements of physiological or behavioral traits of humans. Many biometric...
Wireless Networking Handbook
Wireless Networking Handbook
Many organizations utilize traditional wire-based networking technologies to establish connections among computers. These technologies fall into the following three categories:

• Local area networks (LANs)
• Metropolitan area networks (MANs)
• Wide area networks (WANs)

LANs support the sharing of
...
Microsoft SQL Server 2012 Security Cookbook
Microsoft SQL Server 2012 Security Cookbook
Microsoft SQL Server is becoming a more mature, more feature-rich, and more secure database management system with each new version. SQL Server 2012 is an enterprise-class relational database server. Sometimes, it might not look like it to the staff whose responsibilities are to deploy it, to create databases and write T-SQL code, and to...
Running Linux
Running Linux

You may be contemplating your first Linux installation. Or you may have been using Linux for years and need to know more about adding a network printer or setting up an FTP server. Running Linux, now in its fifth edition, is the book you'll want on hand in either case. Widely recognized in the...

Codes and Ciphers: Julius Caesar, the Enigma, and the Internet
Codes and Ciphers: Julius Caesar, the Enigma, and the Internet
For at least two thousand years there have been people who wanted to
send messages which could only be read by the people for whom they
were intended. When a message is sent by hand, carried from the sender
to the recipient, whether by a slave, as in ancient Greece or Rome, or by
the Post Office today, there is a risk of it
...
Satisficing Games and Decision Making: With Applications to Engineering and Computer Science
Satisficing Games and Decision Making: With Applications to Engineering and Computer Science
We constantly make decisions which are simply "good enough" rather than optimal--a type of decision for which Wynn Stirling has adopted the word "satisficing". Most computer decision making algorithms, however, seek only the optimal solution based on rigid criteria and reject others. Outlining an alternative approach, this...
Acquired Brain Injury: An Integrative Neuro-Rehabilitation Approach
Acquired Brain Injury: An Integrative Neuro-Rehabilitation Approach
Crimmins (2000) marveled at the greatness of the “three pound-blob” that is our brain and control system. As seasoned clinicians in the field of neuro-rehabilitation, we still marvel each day at the resilience of the brain and at the exciting recoveries that we attempt to facilitate in survivors of acquired brain...
Linux Desktop Hacks
Linux Desktop Hacks

With hacks that any user can follow, Linux Desktop Hacks demonstrates how easy it is to modify Linux to suit your desires. The book is packed with tips on customizing and improving the interface, boosting performance, administering your desktop, and generally making the most out of what X, KDE,...

Introduction to Mobile Communications: Technology, Services, Markets
Introduction to Mobile Communications: Technology, Services, Markets
The traditionally separate Fixed, Mobile, and Internet sectors are now converging into a single sector with implications for both technology and business. With so much happening, and so many options available, it is increasingly essential for telecommunication professionals to have a clear view of where the industry is heading. This book provides a...
Perspectives of Neural-Symbolic Integration (Studies in Computational Intelligence)
Perspectives of Neural-Symbolic Integration (Studies in Computational Intelligence)
The human brain possesses the remarkable capability of understanding, interpreting, and producing human language, thereby relying mostly on the left hemisphere. The ability to acquire language is innate as can be seen from disorders such as specific language impairment (SLI), which manifests itself in a missing sense for grammaticality. Language...
unlimited object storage image
Result Page: 91 90 89 88 87 86 85 84 83 82 81 80 79 78 77 76 75 74 73 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy