Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Image Fusion: Algorithms and Applications
Image Fusion: Algorithms and Applications
A complete resource containing in one volume the latest algorithms, design techniques and applications on the 'hot' topic of image fusion

The application of sensor technology has brought considerable interest in the area of image fusion. Written by leading experts in the field, this book brings together in one volume the most
...
The Method Framework for Engineering System Architectures
The Method Framework for Engineering System Architectures
One of the biggest sources of pain in system development is “system integration and test.” This is frequently where projects sailing along with all-green progress reports and Earned Value Management System status summaries start to see these indicators increasingly turn to yellow and then to red. Projects that were thought to be 80...
Software Language Engineering: Third International Conference, SLE 2010
Software Language Engineering: Third International Conference, SLE 2010

We are pleased to present the proceedings of the third international conference on Software Language Engineering (SLE 2010). The conference was held in Eindhoven, the Netherlands during October 12–13, 2010. It was co-located with the ninth international conference on Generative Programming and Component Engineering (GPCE) and the...

Urological Cancers
Urological Cancers
Urological cancer constitutes approximately 30% of all cancer occurring in the Third and Second Worlds. In the main, these diseases are caused by environmental factors, such as diet and smoking, and it is hoped that action to regulate the influence of these environmental pathogens will lead to a decreased incidence over the next two...
Check Point Next Generation Security Administration
Check Point Next Generation Security Administration
Check Point NG aims to teach its readers how to install and set up VPN-1/FireWall-1 Next Generation, the latest version of the highly respected firewall software from Check Point. Its authors--all with significant network and security certifications--accomplish their objective: it seems likely that this book will travel with a lot of Check...
Critical Reflections on Information Systems: A Systemic Approach
Critical Reflections on Information Systems: A Systemic Approach
While implementing IS and IT in support of their business strategies, companies are looking for ways to bridge the gap between their competitive position and technological investment, including ways to use this investment to the advantage of the organization. Critical Reflections on Information Systems: A Systemic Approach faces this challenge by...
Fundamentals of Semiconductor Physics and Devices
Fundamentals of Semiconductor Physics and Devices
People come to technical books with a vast array of daerent needs and requirements, arising from their differing educational backgrounds, professional orientations and career objectives. This is particularly evident in the field of semiconductors, which stands at the juncture of physics, chemistry, electronic engineering, material science and...
Awareness Systems: Advances in Theory, Methodology and Design (Human-Computer Interaction Series)
Awareness Systems: Advances in Theory, Methodology and Design (Human-Computer Interaction Series)

People go about their daily tasks with an in-built awareness of their social and physical environments. This awareness helps them to work cooperatively in groups, coordinate actions, and to maintain and enhance social communication with others. Networked technology has extended the reach of people's awareness to remote and distributed groups and...

OS X and iOS Kernel Programming
OS X and iOS Kernel Programming
Kernel development can be a daunting task and is very different from programming traditional user applications. The kernel environment is more volatile and complex. Extraordinary care must be taken to ensure that kernel code is free of bugs because any issue may have serious consequences to the stability, security, and performance...
Traders at Work: How the World's Most Successful Traders Make Their Living in the Markets
Traders at Work: How the World's Most Successful Traders Make Their Living in the Markets

Shortly after most novice traders discover how trading works and begin to realize that they have the potential to make unlimited amounts of money in the financial markets, they start dreaming the near-impossible dream. They fantasize about buying that condo in Boca Raton for their parents or surprising their son with a brand-new car on his...

Food Webs and Biodiversity: Foundations, Models, Data
Food Webs and Biodiversity: Foundations, Models, Data

Food webs have now been addressed in empirical and theoretical research for more than 50 years. Yet, even elementary foundational issues are still hotly debated. One difficulty is that a multitude of processes need to be taken into account to understand the patterns found empirically in the structure of food webs and communities.

...

Practical Guide to MIMO Radio Channel: with MATLAB Examples
Practical Guide to MIMO Radio Channel: with MATLAB Examples
This book provides an excellent reference to the MIMO radio channel

In this book, the authors introduce the concept of the Multiple Input Multiple Output (MIMO) radio channel, which is an intelligent communication method based upon using multiple antennas. Moreover, the authors provide a summary of the current channel...

unlimited object storage image
Result Page: 185 184 183 182 181 180 179 178 177 176 175 174 173 172 171 170 169 168 167 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy