Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Neural Networks and Artificial Intelligence for Biomedical Engineering (IEEE Press Series on Biomedical Engineering)
Neural Networks and Artificial Intelligence for Biomedical Engineering (IEEE Press Series on Biomedical Engineering)

Using examples drawn from biomedicine and biomedical engineering, this essential reference book brings you comprehensive coverage of all the major techniques currently available to build computer-assisted decision support systems. You will find practical solutions for biomedicine based on current theory and applications of neural networks,...

802.11 WLANs and IP Networking: Security, QoS, and Mobility
802.11 WLANs and IP Networking: Security, QoS, and Mobility
Even after all the earthly riches are enjoyed there still remains in the heart a
longing for knowledge, true knowledge. It is this longing and the desire to bring
the knowledge to others that resulted in the revelation of this book.

“How do IEEE 802.11 wireless local area networks (WLANs) work together
with the
...
MPLS: Next Steps, Volume 1 (The Morgan Kaufmann Series in Networking)
MPLS: Next Steps, Volume 1 (The Morgan Kaufmann Series in Networking)
Multiprotocol Label Switching (MPLS) is a data plane and control technology that is used in packet (that is Internet Protocol) networks. Now over ten years old, it has taken root firmly as a fundamental tool in many service provider networks. The last ten years have seen a considerable consolidation of MPLS techniques and protocols. This has...
Public Key Cryptography: Applications and Attacks (IEEE Press Series on Information and Communication Networks Security)
Public Key Cryptography: Applications and Attacks (IEEE Press Series on Information and Communication Networks Security)

This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It explains the underlying mathematics needed to build these schemes, and examines the most common techniques used in attacking them. Illustrated with many...

Numerical Computing with IEEE Floating Point Arithmetic
Numerical Computing with IEEE Floating Point Arithmetic

Are you familiar with the IEEE floating point arithmetic standard? Would you like to understand it better? This book gives a broad overview of numerical computing, in a historical context, with a special focus on the IEEE standard for binary floating point arithmetic. Key ideas are developed step by step, taking the reader from floating point...

Fiber Optics Engineering (Optical Networks)
Fiber Optics Engineering (Optical Networks)

The book covers the area of fiber optics from an engineering perspective. Emphasis is placed on data conversion between electrical and optical domains and the way limitations in each domain affect the other domain. Techniques to improve the fidelity of this conversion (both from electrical to optical domain, and vise versa) are also covered....

Practical Data Acquisition for Instrumentation and Control Systems (IDC Technology (Paperback))
Practical Data Acquisition for Instrumentation and Control Systems (IDC Technology (Paperback))

This book focuses on data acquisition and control using the PC and standalone instruments. The PC has made a dramatic impact in the ease with which the technician, scientist and engineer today can set up their own test and measurement system at a remarkably low cost. And this book aims to show you how easy it is with plenty of carefully...

Architecture-Independent Programming for Wireless Sensor Networks (Wiley Series on Parallel and Distributed Computing)
Architecture-Independent Programming for Wireless Sensor Networks (Wiley Series on Parallel and Distributed Computing)
New automated, application-independent methodology for designing and deploying sensor networks

Following this book's clear explanations, examples, and illustrations, domain experts can design and deploy nontrivial networked sensing applications without much knowledge of the low-level networking aspects of deployment. This new approach is based...

Multi-Carrier and Spread Spectrum Systems
Multi-Carrier and Spread Spectrum Systems
Multi-Carrier and Spread Spectrum Systems describes and analyses the basic concepts of the combination of multi-carrier transmission with spread spectrum (MC-SS). The various architectures and the different detection strategies are examined in some depth. Techniques for capacity and flexibility enhancement of multi-carrier systems such as...
CMOS Circuit Design, Layout, and Simulation, 3rd Edition (IEEE Press Series on Microelectronic Systems)
CMOS Circuit Design, Layout, and Simulation, 3rd Edition (IEEE Press Series on Microelectronic Systems)

CMOS (complementary metal oxide semiconductor) technology continues to be the dominant technology for fabricating integrated circuits (ICs or chips). This dominance will likely continue for the next 25 years and perhaps even longer. Why? CMOS technology is reliable, manufacturable, low power, low cost, and, perhaps most importantly, scalable....

Middleware for Network Eccentric and Mobile Applications
Middleware for Network Eccentric and Mobile Applications
Middleware is a critical foundation needed to leverage the development of a wide range of mobile and ubiquitous applications. Intrinsic challenges when building such middleware require the combination of expertise from areas like distributed systems, networking, software engineering, and application development.

This textbook provides a...

Advanced Statistical Steganalysis (Information Security and Cryptography)
Advanced Statistical Steganalysis (Information Security and Cryptography)

Steganography and steganalysis, the hiding and detection of a covert payload within an innocent cover object, started to receive attention from the computer science, engineering, and mathematics communities in the 1990s. At first the problems were not clearly defined, but proper statistical foundations were proposed and mathematical...

Result Page: 42 41 40 39 38 37 36 35 34 33 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy