Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
High Voltage and Electrical Insulation Engineering (IEEE Press Series on Power Engineering)
High Voltage and Electrical Insulation Engineering (IEEE Press Series on Power Engineering)

The book is written for students as well as for teachers and researchers in the field of High Voltage and Insulation Engineering. It is based on the advance level courses conducted at TU Dresden, Germany and Indian Institute of Technology Kanpur, India. The book has a novel approach describing the fundamental concept of field dependent...

Springer Handbook of Nanotechnology
Springer Handbook of Nanotechnology

Since 2004 the Springer Handbook of Nanotechnology has established itself as the definitive reference in the nanoscience and nanotechnology area. It integrates the knowledge from nanofabrication, nanodevices, nanomechanics, Nanotribology, materials science, and reliability engineering in just one volume. Beside the presentation of...

JSTL: JSP Standard Tag Library Kick Start
JSTL: JSP Standard Tag Library Kick Start

The JSP Standard Tag Library is a collection of commonly used functions and tools invaluable to JSP developers to avoid re-creating the same functions on site after site. Sun has indicated that JSP development should be based around using tag libraries going forward, and will relase JSP STL, as their official library. This book starts with an...

Software Project Management
Software Project Management
This work covers the fundamentals and the developments in the field of software project management. This second edition covers a wide range of international standards, for example: PRINCE, for which a new version (V2) of this standard has recently been produced; BS 6079 which was published by the British Standard in 1996; EuroMethod, which was...
Large-Scale Software Architecture: A Practical Guide using UML
Large-Scale Software Architecture: A Practical Guide using UML
This book is intended to be a practical guide. Our goal is to be brief. We cover only the essential information to guide software architects in defining the software architecture, providing pointers to further reading in lieu of detailed descriptions of this literature. Ideally, we can help software...
Database and Data Communication Network Systems, Three-Volume Set: Techniques and Applications
Database and Data Communication Network Systems, Three-Volume Set: Techniques and Applications
Database and Data Communication Network Systems examines the utilization of the Internet and Local Area/Wide Area Networks in all areas of human endeavor. This three-volume set covers, among other topics, database systems, data compression, database architecture, data acquisition, asynchronous transfer mode (ATM) and the practical...
DSP Software Development Techniques for Embedded and Real-Time Systems (Embedded Technology)
DSP Software Development Techniques for Embedded and Real-Time Systems (Embedded Technology)
Today's embedded and real-time systems contain a mix of processor types: off-the-shelf microcontrollers, digital signal processors (DSPs), and custom processors. The decreasing cost of DSPs has made these sophisticated chips very attractive for a number of embedded and real-time applications, including automotive, telecommunications, medical...
Ultra-Wideband Communications Systems: Multiband OFDM Approach (Wiley Series in Telecommunications & Signal Processing)
Ultra-Wideband Communications Systems: Multiband OFDM Approach (Wiley Series in Telecommunications & Signal Processing)
The only book that provides full coverage of UWB multiband OFDM technology

Ultra-wideband (UWB) has emerged as a technology that offers great promise to satisfy the growing demand for low-cost, high-speed digital networks. The enormous bandwidth available, the potential for high data rates, and the promise for small size and low processing...

Implementing 802.1X Security Solutions for Wired and Wireless Networks
Implementing 802.1X Security Solutions for Wired and Wireless Networks
When deploying a wireless or wired network, you must ensure that proper security safeguards are put in place. An enterprise, for example, often has valuable resources stored inside databases that are attached to the network. Using passwords to access specific applications is usually not good enough to keep hackers from accessing the resources in an...
Discrete-Signal Analysis and Design
Discrete-Signal Analysis and Design
A clear, step-by-step approach to practical uses of discrete-signal analysis and design, especially for

communications and radio engineers

This book provides an introduction to discrete-time and discrete-frequency signal processing, which is rapidly becoming an important, modern way to design and analyze electronics projects of all...

Reed-Solomon Codes and Their Applications
Reed-Solomon Codes and Their Applications

Electrical Engineering/Communications/Information Theory "The Berlekamp article alone will make this book worth having." --David Forney, Vice President, Motorola Codex Reed-Solomon Codes and Their Applications Edited by Stephen B. Wicker, Georgia Institute of Technology and Vijay K. Bhargava, University of Victoria On the Voyager...

Designing Embedded Processors: A Low Power Perspective
Designing Embedded Processors: A Low Power Perspective
As we embrace the world of personal, portable, and perplexingly complex digital systems, it has befallen upon the bewildered designer to take advantage of the available transistors to produce a system which is small, fast, cheap and correct, yet possesses increased functionality.

Increasingly, these systems have to consume little energy....

unlimited object storage image
Result Page: 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy