Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Digital Communication over Fading Channels: A Unified Approach to Performance Analysis
Digital Communication over Fading Channels: A Unified Approach to Performance Analysis
Regardless of the branch of science or engineering, theoreticians have always been enamored with the notion of expressing their results in the form of closed-form expressions. Quite often, the elegance of the closed-form solution is overshadowed by the complexity of its form and the difficulty in evaluating it numerically. In such instances, one...
Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance
Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance

Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with...

Antenna Design for Mobile Devices (Wiley - IEEE)
Antenna Design for Mobile Devices (Wiley - IEEE)

Expanded and updated, this practical guide is a one-stop design reference containing all an engineer needs when designing antennas

  • Integrates state-of-the-art technologies with a special section for step-by-step antenna design
  • Features up-to-date bio-safety and electromagnetic compatibility regulation...
Resource Management in Wireless Networking
Resource Management in Wireless Networking

This is the first book that provides readers with a deep technical overview of recent advances in resource management for wireless networks at different layers of the protocol stack. The subject is explored in various wireless networks, such as ad hoc wireless networks, 3G/4G cellular, IEEE 802.11, and Bluetooth personal area networks.

...
Verilog and SystemVerilog Gotchas: 101 Common Coding Errors and How to Avoid Them
Verilog and SystemVerilog Gotchas: 101 Common Coding Errors and How to Avoid Them

This book will help engineers write better Verilog/SystemVerilog design and verification code as well as deliver digital designs to market more quickly. It shows over 100 common coding mistakes that can be made with the Verilog and SystemVerilog languages. Each example explains in detail the symptoms of the error, the languages rules that...

Semantic Models for Multimedia Database Searching and Browsing (Advances in Database Systems)
Semantic Models for Multimedia Database Searching and Browsing (Advances in Database Systems)
Semantic Models for Multimedia Database Searching and Browsing begins with the introduction of multimedia information applications, the need for the development of the multimedia database management systems (MDBMSs), and the important issues and challenges of multimedia systems. The temporal relations, the spatial relations, the spatio-temporal...
Usability: Turning Technologies into Tools
Usability: Turning Technologies into Tools
"The book contains much insight." --B. Hazeltine, Computing Reviews

"Unusual in that the research it brings together spans the perspectives of cognitive psychology, the sociology of work and technology, work-oriented systems design, computer-supported cooperative work, and human-computer interaction. Although most of
...
Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security
Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security
Terrorism informatics has been defined as the application of advanced methodologies, information fusion and analysis techniques to acquire, integrate process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications. The wide variety of methods used in terrorism informatics are...
Designing a Wireless Network
Designing a Wireless Network
Wireless network design presents the IT professional with unique obstacles. Your network requires the seamless and secure distribution of information, in spite of competing communication protocols, incompatible hardware platforms, and narrow bandwidths. This book is an introduction to developing efficient means of wireless transport in order to...
Biological Nanostructures and Applications of Nanostructures in Biology: Electrical, Mechanical, and Optical Properties
Biological Nanostructures and Applications of Nanostructures in Biology: Electrical, Mechanical, and Optical Properties
Biological Nanostructures and Applications of Nanostructures in Biology: Electrical, Mechanical, and Optical Properties contains reviews and discussions of contemporary and relevant topics dealing with the interface between the science and technology of nanostructures and the science of biology. Moreover, this book supplements these past...
Computer-Aided Intelligent Recognition Techniques and Applications
Computer-Aided Intelligent Recognition Techniques and Applications
Intelligent recognition methods have recently proven to be indispensable in a variety of modern industries, including computer vision, robotics, medical imaging, visualization and the media. Furthermore, they play a critical role in the traditional fields such as character recognition, natural language processing and personal identification.

...

Introduction to Random Signals and Noise
Introduction to Random Signals and Noise

Random signals and noise are present in many engineering systems and networks. Signal processing techniques allow engineers to distinguish between useful signals in audio, video or communication equipment, and interference, which disturbs the desired signal.

With a strong mathematical grounding, this text...

unlimited object storage image
Result Page: 43 42 41 40 39 38 37 36 35 34 33 32 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy