Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
ULSI Devices
ULSI Devices

A complete guide to current knowledge and future trends in ULSI devices Ultra-Large-Scale Integration (ULSI), the next generation of semiconductor devices, has become a hot topic of investigation. ULSI Devices provides electrical and electronic engineers, applied physicists, and anyone involved in IC design and process development with a...

Smart Light-Responsive Materials: Azobenzene-Containing Polymers and Liquid Crystals
Smart Light-Responsive Materials: Azobenzene-Containing Polymers and Liquid Crystals
This book reviews the cutting-edge significant research in the field of smart light-responsive materials based on azobenzene polymers and liquid crystals. Emphasis is placed on the discovery of new phenomena from the past 5 years, their underlying mechanisms, new functionalities, and properties achieved through rational design. Edited by leading...
Signal Integrity and Radiated Emission of High-Speed Digital Systems
Signal Integrity and Radiated Emission of High-Speed Digital Systems

Before putting digital systems for information technology or telecommunication applications on the market, an essential requirement is to perform tests in order to comply with the limits of radiated emission imposed by the standards.

This book provides an investigation into signal integrity (SI) and electromagnetic interference...

Computational Models of Argument:  Volume 144 Frontiers in Artificial Intelligence and Applications
Computational Models of Argument: Volume 144 Frontiers in Artificial Intelligence and Applications
The papers in this volume formed the programme of the 1st International Conference on Computational Models of Argument (COMMA), which was hosted by the Dept. of Computer Science of The University of Liverpool from Sept. 11th–12th, 2006. This conference originated from the ASPIC project1 from which significant support has been received. The...
Optical and Digital Techniques for Information Security (Advanced Sciences and Technologies for Security Applications)
Optical and Digital Techniques for Information Security (Advanced Sciences and Technologies for Security Applications)
This book comprehensively surveys the results of research investigation and technologies used to secure, verify, recognize, track, and authenticate objects and information from theft, counterfeiting, and manipulation by unauthorized persons and agencies. This book will draw on the diverse expertise in optical sciences and engineering, digital...
Computer Crime: A Crimefighter's Handbook (Computer Security)
Computer Crime: A Crimefighter's Handbook (Computer Security)

Terrorist attacks on computer centers, electronic fraud on international funds transfer networks, viruses and worms in our software, corporate espionage on business networks, and crackers breaking into systems on the Internet...Computer criminals are becoming ever more technically sophisticated, and it's an increasing challenge to keep up...

Applied Data Science with Python and Jupyter: Use powerful industry-standard tools to unlock new, actionable insights from your data
Applied Data Science with Python and Jupyter: Use powerful industry-standard tools to unlock new, actionable insights from your data

Become the master player of data exploration by creating reproducible data processing pipelines, visualizations, and prediction models for your applications.

Key Features

  • Get up and running with the Jupyter ecosystem and some example datasets
  • Learn about key machine...
Constructing Measures: An Item Response Modeling Approach
Constructing Measures: An Item Response Modeling Approach
Constructing Measures introduces a way to understand the advantages and disadvantages of measurement instruments, how to use such instruments, and how to apply these methods to develop new instruments or adapt old ones. The book is organized around the steps taken while constructing an instrument. It opens with a summary of the...
Scalable Optimization via Probabilistic Modeling: From Algorithms to Applications (Studies in Computational Intelligence)
Scalable Optimization via Probabilistic Modeling: From Algorithms to Applications (Studies in Computational Intelligence)
Estimation of distribution algorithms (EDAs) address broad classes of optimization problems by learning explicit probabilistic models of promising solutions found so far and sampling the built models to generate new candidate solutions. By incorporating advanced machine learning techniques into genetic and evolutionary algorithms, EDAs can scalably...
Apple Training Series: Mac OS X Advanced System Administration v10.5
Apple Training Series: Mac OS X Advanced System Administration v10.5
Welcome to the official reference guide for the Apple Mac OS X Advanced System Administration v10.5 certification course. This book serves as a self-paced guide and is designed to help you build the basic skills you need to effectively administer Mac OS X and Mac OS X Server systems. Apple Training Series: Mac OS X Advanced System Administration...
The Encyclopedia Of International Organized Crime (Facts on File Crime Library)
The Encyclopedia Of International Organized Crime (Facts on File Crime Library)
As a reporter, columnist, and author who has written extensively about organized crime for more than three decades, my primary beat has been what is referred to by the Federal Bureau of Investigation (FBI) as “traditional organized crime.” In official court documents, the FBI identifies the organization as La Cosa Nostra (LCN). Most...
5G-Enabled Vehicular Communications and Networking (Wireless Networks)
5G-Enabled Vehicular Communications and Networking (Wireless Networks)

This book investigates and reviews recent advanced techniques and important applications in vehicular communications and networking (VCN) from a novel perspective of the combination and integration of VCN and connected vehicles, which provides a significant scientific and technical support for future 5G-based...

unlimited object storage image
Result Page: 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy