Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computer Methods for Analysis of Mixed-Mode Switching Circuits
Computer Methods for Analysis of Mixed-Mode Switching Circuits

Mixed-mode switching circuits distinguish themselves from other circuits by including switches that are either clocked externally or controlled internally. These circuits have found broad applications in telecommunication networks, instrumentation, and power electronic systems, to name a few. It is the emergence of switched capacitor...

Graphics Tools---The jgt Editors' Choice
Graphics Tools---The jgt Editors' Choice

Computer Graphics professionals can now find in one volume a collection of 32 "gems" chosen by the editors of the journal of graphics tools, one of the leading publications in the field. These selected papers provide practical ideas and techniques that solve real problems in the areas of - Math & Programming Techniques...

Textbook of Drug Design and Discovery, Fourth Edition
Textbook of Drug Design and Discovery, Fourth Edition

The molecular biological revolution and the mapping of the human genome continue to provide new challenges and opportunities for drug research and design. Future medicinal chemists and drug designers must have a firm background in a number of related scientific disciplines in order to understand the conversion of new insight into lead...

Pheromones and Animal Behavior: Chemical Signals and Signatures
Pheromones and Animal Behavior: Chemical Signals and Signatures

Pheromones and other kinds of chemical communication underlie the behavior of all animals. Building on the strengths of the first edition, widely recognized as the leading text in the subject, this is a comprehensive overview of how pheromones work. Extensively revised and expanded to cover advances made over the last ten years, the book...

Radiobiology and Environmental Security (NATO Science for Peace and Security Series C: Environmental Security)
Radiobiology and Environmental Security (NATO Science for Peace and Security Series C: Environmental Security)

This volume - like the N.A.T.O. Advanced Research Workshop on which it is based - addresses the fundamental science that contributes to our understanding of the potential risks from ecological terrorism, i.e. dirty bombs, atomic explosions, intentional release of radionuclides into water or air. Both effects on human health (D.N.A. and...

NLTK Essentials
NLTK Essentials

Build cool NLP and machine learning applications using NLTK and other Python libraries

About This Book

  • Extract information from unstructured data using NLTK to solve NLP problems
  • Analyse linguistic structures in text and learn the concept of semantic analysis and parsing
  • ...
Genetic Damage in Human Spermatozoa (Advances in Experimental Medicine and Biology)
Genetic Damage in Human Spermatozoa (Advances in Experimental Medicine and Biology)

There are several types of damage that can be found in the male gamete. Genetic damage in spermatozoa can originate during spermatogenesis, or it can originate during transit in both male and female genital tracts. Damage can also be due to ageing, environmental or iatrogenic conditions, as well as to the protocols to cryopreserve and to...

Database Anonymization: Privacy Models, Data Utility, and Microaggregation-based Inter-model Connections
Database Anonymization: Privacy Models, Data Utility, and Microaggregation-based Inter-model Connections

The current social and economic context increasingly demands open data to improve scientific research and decision making. However, when published data refer to individual respondents, disclosure risk limitation techniques must be implemented to anonymize the data and guarantee by design the fundamental right to privacy of the subjects the...

Statistical Approach to Quantum Field Theory: An Introduction (Lecture Notes in Physics)
Statistical Approach to Quantum Field Theory: An Introduction (Lecture Notes in Physics)

Over the past few decades the powerful methods of statistical physics and Euclidean quantum field theory have moved closer together, with common tools based on the use of path integrals. The interpretation of Euclidean field theories as particular systems of statistical physics has opened up new avenues for understanding strongly coupled...

Telomeres and Telomerase in Aging, Disease, and Cancer: Molecular Mechanisms of Adult Stem Cell Ageing
Telomeres and Telomerase in Aging, Disease, and Cancer: Molecular Mechanisms of Adult Stem Cell Ageing

Telomere shortening represents one of the basic aspects of ageing and telomere dysfunction could contribute to the accumulation of DNA damage during ageing. This book summarizes evidence and data indicating that telomere dysfunction influences human ageing, diseases and cancer. The book describes our current knowledge on checkpoints that...

Advanced Computing, Networking and Informatics- Volume 2: Wireless Networks and Security Proceedings of the Second International Conference on ... (Smart Innovation, Systems and Technologies)
Advanced Computing, Networking and Informatics- Volume 2: Wireless Networks and Security Proceedings of the Second International Conference on ... (Smart Innovation, Systems and Technologies)

Advanced Computing, Networking and Informatics are three distinct and mutually exclusive disciplines of knowledge with no apparent sharing/overlap among them. However, their convergence is observed in many real world applications, including cyber-security, internet banking, healthcare, sensor networks, cognitive radio, pervasive computing...

Security Controls Evaluation, Testing, and Assessment Handbook
Security Controls Evaluation, Testing, and Assessment Handbook

Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine, and test installed security controls in the world of...

unlimited object storage image
Result Page: 788 787 786 785 784 783 782 781 780 779 778 777 776 775 774 773 772 771 770 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy