Home | Amazing | Today | Tags | Publishers | Years | Search 
Logic Functions and Equations: Examples and Exercises
Logic Functions and Equations: Examples and Exercises
The field of binary Logics has two main areas of application, the Digital Design of Circuits (related to Electrical Engineering) and Propositional Logics (related to Mathematics, Artificial Intelligence, Complexity etc.). In both cases it is quite possible to teach the theoretical foundations and to do some exercises, but in both cases the examples...
Recent Advances in Design and Decision Support Systems in Architecture and Urban Planning
Recent Advances in Design and Decision Support Systems in Architecture and Urban Planning
The International conference on Design & Decision Support Systems in Architecture and Urban Planning is organised bi-annually by the Eindhoven University of Technology. This volume contains a selection of papers from the seventh conference that was held at De Ruwenberg Castle in Sint-Michiels Gestel, The Netherlands, from 2 to 5 July, 2004....
Adaptive Antennas and Receivers (Electrical and Computer Enginee)
Adaptive Antennas and Receivers (Electrical and Computer Enginee)
In our modern age of remote sensing, wireless communication, and the nearly endless list of other antenna-based applications, complex problems require increasingly sophisticated solutions. Conventional antenna systems are no longer suited to high-noise or low-signal applications such as intrusion detection. Detailing highly effective approaches to...
Intelligent Environments: Methods, Algorithms and Applications (Advanced Information and Knowledge Processing)
Intelligent Environments: Methods, Algorithms and Applications (Advanced Information and Knowledge Processing)
This innovative book discusses engineering solutions for the automatic understanding of a complex scene via multi-modal arrays of sensors. It focuses on research dealing with robotic platforms that augment an environment. In particular, it considers the study of information fusion methods, the study of algorithms for ontology learning from tabula...
Behavioral Biometrics: A Remote Access Approach
Behavioral Biometrics: A Remote Access Approach

With the advent of the internet as a medium for performing business transactions, the need for a secure communication channel has never been more paramount. The study of behavioral biometrics - the verification and/or identification of individuals based on the way they provide information to an authentication system - originated from the need...

Understanding Your Dog For Dummies (Pets)
Understanding Your Dog For Dummies (Pets)

Find out about canine communication and motivation

The fun and easy way® to get into your dog's head and be the leader of your pack

What makes Spot go? What makes Cujo psycho? This friendly guide helps you understand the emotional makeup and drives of your dog. All kinds of...

Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
The protection of critical information and systems is a major component of today's electronic business community. This valuable reference presents the primary hardware-based computer security approaches in an easy-to-read toolbox format. The techniques discussed show readers how to perform their own evaluation of new and emerging security...
Engineering the User Interface: From Research to Practice
Engineering the User Interface: From Research to Practice
This book contains a collection of the best papers presented at the VII International Conference on Interacción Persona-Ordenador (IPO), Human-Computer Interaction in Spanish, which took place in Puertollano (Ciudad Real) on November 13th-17th, 2006. In its seventh edition this conference has become a multidisciplinary forum for the...
Data Mining for Intelligence, Fraud & Criminal Detection: Advanced Analytics & Information Sharing Technologies
Data Mining for Intelligence, Fraud & Criminal Detection: Advanced Analytics & Information Sharing Technologies
Every organization, bureau, agency, and corporation has fundamental analytical needs that traditionally require a significant amount of data integration and resources. Whether investigating money laundering, insider trading, insurance fraud, or terrorist behavior, the analytical processes and systems architectures are very similar. In fact, the...
Microsoft SQL Server 2005 Analysis Services (SQL Server Series)
Microsoft SQL Server 2005 Analysis Services (SQL Server Series)
Microsoft SQL Server Analysis Services provides fast access to data by means of multidimensional data structures and the multidimensional query languag MDX. Analysis Services provides the capability to design, create, and manage multidimensional cubes based on data warehouse tables, and it serves as the foundation for the Microsoft  Business...
Digital Character Development: Theory and Practice
Digital Character Development: Theory and Practice
Digital characters are a driving force in the entertainment industry today. Every animated film and video game production spends a large percentage of its resources and time on advancing the quality of the digital characters inhabiting the world that they are creating. We have entered an era when digital characters have reached a level of...
Intelligent Sensor Design Using the Microchip dsPIC (Embedded Technology)
Intelligent Sensor Design Using the Microchip dsPIC (Embedded Technology)
In this book, readers will find:

In-depth design techniques, real-world examples, detailed figures and usable code

Application chapters thoroughly exploring temperature, pressure and load, and flow sensors

A FREE CD that provides a toolkit of software models in both C and assembly language

Intelligent
...
Result Page: 140 139 138 137 136 135 134 133 132 131 130 129 128 127 126 125 124 123 122 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy