 |
|
 Airplane Flight Dynamics and Automatic Flight Controls Pt. 1
In this two-part textbook, methods are presented for analysis and synthesis of the steady state
and perturbed state (open and closed loop) stability and control of fixed wing aircraft.
Part I contains Chapters 1-6 and Appendices A-D. Part Ð contains Chapters 7-12 as well
as Appendix E.
The book is aimed at junior, senior... |  |  Airplane Flight Dynamics and Automatic Flight Controls: Part 2
In this two-part textbook, methods are presented for analysis and synthesis of the steady state
and perturbed state (open and closed loop) stability and control of fixed wing aircraft.
Part I contains Chapters 1-6 and Appendices A-D. Part II contains Chapters 7-12 as well
as Appendix E.
The book is aimed at junior, senior and... |  |  Design of Hashing Algorithms (Lecture Notes in Computer Science)
Historically, computer security is related to both cryptography and access
control in operating systems. Cryptography, although mostly applied in
the military and diplomacy, was used to protect communication channels
and storage facilities (especially the backups). In the seventies there was a
breakthrough in cryptography - the... |
|
|
 Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats
Thank you for picking up this book! We believe that if you are reading this page, you are an individual seeking to gain a greater degree of familiarity with cybercrime and espionage, and more likely than not, believe that the realities outweigh the fear, uncertainty, and doubt associated with these two topics. Our desire in writing this... |  |  Inside Cyber Warfare: Mapping the Cyber Underworld
I was recently invited to participate in a cyber security dinner discussion by a few
members of a well-known Washington, DC, think tank. The idea was that we could
enjoy a fine wine and a delicious meal while allowing our hosts to pick our brains about
this “cyber warfare stuff.” It seems that the new ... |  |  Pro iOS 5 Augmented Reality
Welcome to Pro iOS 5 Augmented Reality. Augmented reality (AR) has existed in sci-fi
movies for decades, is used in the military for head-up displays (HUDs), and until
recently, has been a thing of the future. With the upswing in mobile applications since
the introduction of the iPhone and the Android operating system, applications... |
|
 |  |  Energy Supply and Renewable Resources
One has only to read a newspaper or magazine to realize the importance of
energy at this early juncture of the 21st century. It will surely become more
critical as world demand for oil continues to increase and its supply peaks
and begins to fall.
Industrialized nations have become addicted to an ever-increasing... |  |  Ceramic Matrix Composites: Fiber Reinforced Ceramics and their Applications
Ceramic Matrix Composites (CMCs) represent a relatively new class of quasiductile
ceramic materials. They are characterized by carbon or ceramic fi bers embedded
in ceramic matrices (oxide or non - oxide) with comparatively low bonding
forces between the fi bers and the matrix. These weak intefaces, in combination
with a porous... |
|
Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |