Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Noise Sources in Turbulent Shear Flows: Fundamentals and Applications (CISM International Centre for Mechanical Sciences)
Noise Sources in Turbulent Shear Flows: Fundamentals and Applications (CISM International Centre for Mechanical Sciences)

The articles in this volume present the state-of-the-art in noise prediction, modeling and measurement. The articles are partially based on class notes provided during the course `Noise sources in turbulent shear flows', given at CISM on April 2011. The first part contains general concepts of aero acoustics, including vortex sound theory...

Recent Advances in Computational Optimization: Results of the Workshop on Computational Optimization WCO 2017 (Studies in Computational Intelligence (795))
Recent Advances in Computational Optimization: Results of the Workshop on Computational Optimization WCO 2017 (Studies in Computational Intelligence (795))

Our everyday lives are practically unthinkable without optimization. We constantly try to minimize our effort and to maximize the reward or progress achieved. Many real-world and industrial problems arising in engineering, economics, medicine and other domains can be formulated as optimization tasks. This volume presents a...

Autism Spectrum Disorders: Identification, Education, and Treatment
Autism Spectrum Disorders: Identification, Education, and Treatment
The field of autism has been growing at an unprecedented rate in recent years. In addition to an actual rise in the number of classic DSM-IV cases, broadened diagnostic criteria have uncovered a wider range of autistic behaviors and ability levels. The third edition of this well-known text continues the mission of its predecessors--to present a...
CompTIA RFID+ Study Guide: Exam RF0-101
CompTIA RFID+ Study Guide: Exam RF0-101
This comprehensive study guide thoroughly covers the CompTIA RFID+ exam, the only certification offered for radio frequency identification (RFID), the technology that is rapidly gaining popularity and is expected to completely replace bar codes. Your study will focus on interrogation zone basics, testing and troubleshooting, standards and...
Web Service Contract Design and Versioning for SOA
Web Service Contract Design and Versioning for SOA

The Ultimate Guide for Designing and Governing Web Service Contracts

 

For Web services to succeed as part of SOA, they require balanced, effective technical contracts that enable services to be evolved and repeatedly reused for years to come....

Bioinformatics Basics: Applications in Biological Science and Medicine
Bioinformatics Basics: Applications in Biological Science and Medicine

Scientists in the throes of research use an extensive data bank to access structural information on proteins and nucleic acids. Meanwhile, geneticists use a highly specialized form of software to analyze the hybridization pattern of DNA chips. The past decade has been tremendously successful for biotechnology and pharmaceutical...

Neuroanatomical Tract-Tracing: Molecules, Neurons, and Systems
Neuroanatomical Tract-Tracing: Molecules, Neurons, and Systems
Having been available for 70 years, it seems reasonable to ask what transmission electron microscopy (TEM) can add to the investigation of the nervous system in the new millennium. Today, the basic synaptic organization of most brain regions is known, as is the morphological detail of most neurons and support cells. Chapters in...
Biometrics: Personal Identification in Networked Society
Biometrics: Personal Identification in Networked Society
Determining the identity of a person is becoming critical in our vastly interconnected
information society. As increasing number of biometrics-based identification systems
are being deployed for many civilian and forensic applications, biometrics and its
applications have evoked considerable interest. The current state of affairs is
...
Websphere MQ Security in an Enterprise Environment (IBM Redbooks)
Websphere MQ Security in an Enterprise Environment (IBM Redbooks)

This IBM Redbook considers an enterprise and describes some of the procedures and documentation that need to be developed to secure WebSphere MQ on the z/OS (zSeries), OS/400 (iSeries), IBM AIX (pSeries) and Windows 2000 (xSeries) platforms. This Redbook also documents the before and after configurations needed to take advantage of the recent...

Recent Developments in Computational Collective Intelligence (Studies in Computational Intelligence)
Recent Developments in Computational Collective Intelligence (Studies in Computational Intelligence)

The book consists of 19 extended and revised chapters based on original works presented during a poster session organized within the 5th International Conference on Computational Collective Intelligence that was held between 11 and 13 of September 2013 in Craiova, Romania. The book is divided into three parts. The first part is titled...

Biometric Systems: Technology, Design and Performance Evaluation
Biometric Systems: Technology, Design and Performance Evaluation
This book provides practitioners with an overview of the principles & methods needed to build reliable biometric systems. It covers 3 main topics: key biometric technologies, testing & management issues, & the legal and system considerations of biometric systems for personal verification/identification. It focuses on the 4 most widely...
Forensic Cremation Recovery and Analysis
Forensic Cremation Recovery and Analysis
Immediately apparent is the author’s vast experience in processing fire scenes and analyzing cremains. … a well-written text that is a valuable resource to forensic anthropology students and fire scene responders alike.
—J.C. Love, Harris County Medical Examiner’s Office, Houston, Texas,
...
unlimited object storage image
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy