Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Speech and Audio Processing in Adverse Environments (Signals and Communication Technology)
Speech and Audio Processing in Adverse Environments (Signals and Communication Technology)
The book reflects the state of the art in important areas of speech and audio signal processing. It presents topics which are missed so far and most recent findings in the field. Leading international experts report on their field of work and their new results.

Considerable amount of space is covered by multi-microphone systems, specific...

Software in 30 Days: How Agile Managers Beat the Odds, Delight Their Customers, And Leave Competitors In the Dust
Software in 30 Days: How Agile Managers Beat the Odds, Delight Their Customers, And Leave Competitors In the Dust

A radical approach to getting IT projects done faster and cheaper than anyone thinks possible

Software in 30 Days summarizes the Agile and Scrum software development method, which allows creation of game-changing software, in just 30 days. Projects that use it are three times more successful than those that don't....

MATLAB Differential Equations
MATLAB Differential Equations

MATLAB is a high-level language and environment for numerical computation, visualization, and programming. Using MATLAB, you can analyze data, develop algorithms, and create models and applications. The language, tools, and built-in math functions enable you to explore multiple approaches and reach a solution faster than with spreadsheets or...

Revision of loose femoral prostheses with a stem system based on the "press-fit" principle
Revision of loose femoral prostheses with a stem system based on the "press-fit" principle

The author of this multimedia work sets himself an ambitious goal: to allow a surgeon to achieve the revision of a prosthesis without too many difficulties (or too much apprehension!) with guaranteed results if he follows the proposed method step by step, and this, even if he is not very experienced in this discipline.To fulfil this purpose,...

RFID Security
RFID Security

RFID (Radio Frequency Identification) is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that allow them to receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from Exxon EZ passes to dogs to...

Data Mining In Time Series Databases (Series in Machine Perception and Artificial Intelligence)
Data Mining In Time Series Databases (Series in Machine Perception and Artificial Intelligence)
Traditional data mining methods are designed to deal with “static” databases, i.e. databases where the ordering of records (or other database objects) has nothing to do with the patterns of interest. Though the assumption of order irrelevance may be sufficiently accurate in some applications, there are certainly many other cases, where...
Aldol Reactions
Aldol Reactions
Aldol Reactions provides a comprehensive up-to-date overview of aldol reactions including application of different metal enolates; catalytic aldol additions catalyzed by different Lewis acids and Lewis bases; enantioselective direct aldol additions; antibodies and enzyme catalyzed aldol additions and the recent aggressive development of...
A Practical Guide to Data Mining for Business and Industry
A Practical Guide to Data Mining for Business and Industry

Data mining is well on its way to becoming a recognized discipline in the overlapping areas of IT, statistics, machine learning, and AI. Practical Data Mining for Business presents a user-friendly approach to data mining methods, covering the typical uses to which it is applied. The methodology is complemented by case studies to create...

Concurrent, Real-Time and Distributed Programming in Java: Threads, RTSJ and RMI (Focus: Computer Science)
Concurrent, Real-Time and Distributed Programming in Java: Threads, RTSJ and RMI (Focus: Computer Science)

This book provides an introduction to concurrent, real-time, distributed programming with Java object-oriented language support as an algorithm description tool. It describes in particular the mechanisms of synchronization (cooperative and competitive) and sharing of data (internal class, static variables) between threads in Java. He...

A History of Modern Urban Operations
A History of Modern Urban Operations
This book investigates the complexities of modern urban operations?a particularly difficult and costly method of fighting, and one that is on the rise. Contributors examine the lessons that emerge from a range of historical case studies, from nineteenth-century precedents to the Battle of Shanghai; Stalingrad, German town clearance, Mandalay,...
Vibration of Continuous Systems
Vibration of Continuous Systems

A revised and up-to-date guide to advanced vibration analysis written by a noted expert

The revised and updated second edition of Vibration of Continuous Systems offers a guide to all aspects of vibration of continuous systems including: derivation of equations of motion, exact and approximate...

Migrants Before the Law: Contested Migration Control in Europe
Migrants Before the Law: Contested Migration Control in Europe
This book traces the practices of migration control and its contestation in the European migration regime in times of intense politicization. The collaboratively written work brings together the perspectives of state agents, NGOs, migrants with precarious legal status, and their support networks, collected through multi-sited fieldwork...
unlimited object storage image
Result Page: 84 83 82 81 80 79 78 77 76 75 74 73 72 71 70 69 68 67 66 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy