Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Performance Metrics for Haptic Interfaces (Springer Series on Touch and Haptic Systems)
Performance Metrics for Haptic Interfaces (Springer Series on Touch and Haptic Systems)

Haptics technology is being used more and more in different applications, such as in computer games for increased immersion, in surgical simulators to create a realistic environment for training of surgeons, in surgical robotics due to safety issues and in mobile phones to provide feedback from user action. The existence of these applications...

Atrial Fibrillation after Cardiac Surgery (Developments in Cardiovascular Medicine)
Atrial Fibrillation after Cardiac Surgery (Developments in Cardiovascular Medicine)

Cardiac surgery is performed on hundreds of thousands of patients a year, and can have an important beneficial impact on the outcomes of patients with coronary and valvular heart diseases. Despite the favorable recovery of most patients, some will have their post-operative period interrupted by the development of atrial fibrillation, with a...

Sensors: Theory, Algorithms, and Applications (Springer Optimization and Its Applications)
Sensors: Theory, Algorithms, and Applications (Springer Optimization and Its Applications)
In recent years, technological advances have resulted in the rapid development of a new exciting research direction – the interdisciplinary use of sensors for data collection, systems analysis, and monitoring. Application areas include military surveillance, environmental screening, computational neuroscience,...
Analyzing Requirements and Defining .Net Solution Architectures (Exam 70-300)
Analyzing Requirements and Defining .Net Solution Architectures (Exam 70-300)

MCSD Analyzing Requirements and Defining .NET Solution Architectures Exam Cram 2 (Exam 70-300) helps you pass the 70-300 exam, which is a core exam in the MCSD .NET track and measures the ability to analyze requirements and define Microsoft .NET solution architectures. This exam is extremely...

Professional InfoPath 2003
Professional InfoPath 2003
Microsoft InfoPath 2003 helps developers tackle forms-based information-gathering with the full range of XML technologies. This book quickly guides experienced Office and XML developers through InfoPath fundamentals, including XML form templates architecture, form definition file structure, available external data sources, and backend services....
Firewall Policies and VPN Configurations
Firewall Policies and VPN Configurations
Deploying a network security policy is a significant and serious undertaking. Making good decisions in this matter will save a great deal of money and prevent many future security issues on your network, while making incorrect or hasty decisions will lay the foundation for an insecure network infrastructure. Creating a network security policy will...
Grid Generation Methods (Scientific Computation)
Grid Generation Methods (Scientific Computation)
This book is an introduction to structured and unstructured grid methods in scientific computing, addressing graduate students, scientists as well as practitioners. Basic local and integral grid quality measures are formulated and new approaches to mesh generation are reviewed. In addition to the content of the successful first edition, a more...
Anti-Spam Measures: Analysis and Design
Anti-Spam Measures: Analysis and Design
The primary goal of this work is the methodical analysis of the potential, limitations, advantages, and drawbacks of anti-spam measures. These determine to which extent the measures can contribute to the reduction of spam in the long run. The range of considered anti-spam measures includes legislative, organizational, behavioral and technological...
The Encyclopedia of Children's Health and Wellness (Facts on File Library of Health and Living)
The Encyclopedia of Children's Health and Wellness (Facts on File Library of Health and Living)
Despite the fact that the risk of childhood disease is lower now than it has been in the past, childhood health care needs remain complex. This is mainly because as society and technology change rapidly, children are routinely exposed to new potential threats. For instance, in the last few years the National Institutes of Health and the Surgeon...
Analysis of Correlated Data with SAS and R
Analysis of Correlated Data with SAS and R
Previously known as Statistical Methods for Health Sciences, this bestselling resource is one of the first books to discuss the methodologies used for the analysis of clustered and correlated data. While the fundamental objectives of its predecessors remain the same, Analysis of Correlated Data with SAS and R, Third Edition incorporates...
Approximation and Online Algorithms: 8th International Workshop, WAOA 2010
Approximation and Online Algorithms: 8th International Workshop, WAOA 2010

Networked systems for transport, communication, and social interaction have contributed to all aspects of life by increasing economic and social efficiency. However, increased connectivity also gives intruders and attackers better opportunities to maliciously spread in the network, whether the spread is of disinformation, or of contamination...

Soft Computing for Recognition based on Biometrics (Studies in Computational Intelligence)
Soft Computing for Recognition based on Biometrics (Studies in Computational Intelligence)
We describe in this book, bio-inspired models and applications of hybrid intelligent systems using soft computing techniques for image analysis and pattern recognition based on biometrics and other information sources. Soft Computing (SC) consists of several intelligent computing paradigms, including fuzzy logic, neural networks,...
Result Page: 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy