Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Seismic Amplitude Inversion in Reflection Tomography
Seismic Amplitude Inversion in Reflection Tomography

This is the first book of its kind on seismic amplitude inversion in the context of reflection tomography. The aim of the monograph is to advocate the use of ray-amplitude data, separately or jointly with traveltime data, in reflection seismic tomography.

The emphasis of seismic exploration is on imaging techniques, so that
...

Synchronizing Internet Protocol Security (SIPSec) (Advances in Information Security)
Synchronizing Internet Protocol Security (SIPSec) (Advances in Information Security)
The open design of the internet has not only opened many new opportunities for communications, but it has also opened many new avenues for attacks against organizational network and computing resources. Information security has become a major concern in recent times, as more and more computers are being connected to the global internet. With so...
The Language of Empire: Rome and the Idea of Empire From the Third Century BC to the Second Century AD
The Language of Empire: Rome and the Idea of Empire From the Third Century BC to the Second Century AD
The Roman Empire has been an object of fascination for the past two millennia, and the story of how a small city in central Italy came to dominate the whole of the Mediterranean basin, most of modern Europe and the lands of Asia Minor and the Middle East, has often been told. It has provided the model for European empires from Charlemagne to Queen...
Resource Allocation in Multiuser Multicarrier Wireless Systems
Resource Allocation in Multiuser Multicarrier Wireless Systems
Many algorithms have already been proposed in the past to solve the problem of allocating resources in a multi-user multicarrier wireless system. Due to the difficulty of the problem, most of the previous work in this area has focused on developing suboptimal heuristics without performance guarantees.

Resource Allocation in Multiuser...

Digital Filters And Signal Processing (Hb 2014)
Digital Filters And Signal Processing (Hb 2014)
Digital filters, together with signal processing, are being employed in the new technologies and information systems, and implemented in different areas and applications. Digital filters and signal processing are used with no costs and they can be adapted to different cases with great flexibility and reliability.

...
Handbook of Psychology, Assessment Psychology (Volume 10)
Handbook of Psychology, Assessment Psychology (Volume 10)
Psychology at the beginning of the twenty-first century has become a highly diverse field of scientific study and applied technology. Psychologists commonly regard their discipline as the science of behavior, and the American Psychological Association has formally designated 2000 to 2010 as the “Decade of...
Cyber Crime Investigator's Field Guide
Cyber Crime Investigator's Field Guide
Long gone are the days when a computer took up an entire room. Now we have computers at home, laptops that travel just about anywhere, and data networks that allow us to transmit information from virtually any location in a timely and efficient manner. What have these advancements brought us? Another arena for criminal activity. If someone wants to...
A Science Strategy for the Exploration of Europa (Compass Series)
A Science Strategy for the Exploration of Europa (Compass Series)
Terrestrial studies of life in extreme environments now show that Earth is teeming with microorganisms. Nearly every locale that contains two ingredients, liquid water and some form of energy, appears to host a variety of microbes living happily under conditions that just a few years ago would have seemed impossibly inhospitable. There is also...
Human Retroviral Infections: Immunological and Therapeutic Control
Human Retroviral Infections: Immunological and Therapeutic Control
The mechanisms of disease production by infectious agents are presently the focus of an unprecedented flowering of studies. The field has undoubtedly received impetus from the considerable advances recently made in the understanding of the structure, biochemistry, and biology of viruses, bacteria, fungi, and other parasites....
A Textbook of Clinical Ophthalmology: A Practical Guide to Disorders of the Eyes and Their Management
A Textbook of Clinical Ophthalmology: A Practical Guide to Disorders of the Eyes and Their Management

The material in this textbook on clinical ophthalmology has been revised and expanded to include developments in research and practice. Containing 357 illustrations throughout the text, it is a practical guide to the study of ophthalmology, but it embraces the ocular aspects of general diseases world-wide and basic methods of investigation...

Introduction to Social Media Investigation: A Hands-on Approach
Introduction to Social Media Investigation: A Hands-on Approach

If you’re interested in using social media as an investigative tool, Introduction to Social Media Investigation will show you how! Social networks and social media, like Facebook, Twitter, and Foursquare, are some of the most popular services on the Web, with hundreds of millions of users. The public information that people share...

Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors
Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors
Written by a former NYPD cyber cop, this is the only book available that discusses the hard questions cyber crime investigators are asking.

The book begins with the chapter What is Cyber Crime? This introductory chapter describes the most common challenges faced by cyber investigators today. The following chapters discuss the
...
unlimited object storage image
Result Page: 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy