Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Augmented Vision Perception in Infrared: Algorithms and Applied Systems (Advances in Pattern Recognition)
Augmented Vision Perception in Infrared: Algorithms and Applied Systems (Advances in Pattern Recognition)
Spurred by security and safety challenges, research efforts in thermographic sensors have advanced greatly, resulting in better performance in remote surveillance, object recognition, guidance and so on.

 

This comprehensive survey provides a thorough account of the recent deployment of infrared sensors in modern applications of...

The Art of Information Warfare: Insight into the Knowledge Warrior Philosophy
The Art of Information Warfare: Insight into the Knowledge Warrior Philosophy

Information is a two edged sword that can both help and hinder modern society. The Art of Information Warfare is the first common-sense primer on the subject written for those interested in or requiring a practical orientation to the threats and issues associated with today's Information Society from military, corporate, and...

Software Engineering Reviews and Audits
Software Engineering Reviews and Audits

I have worked in systems engineering, software development, software configuration management, software testing, and software quality assurance organizations for more than 30 years. My experience in these selected fields has been somewhat different from that of most people. I always wanted to experience the software disciplines required in...

Linear Programming and Network Flows
Linear Programming and Network Flows

Linear Programming deals with the problem of minimizing or maximizing a linear function in the presence of linear inequalities. Since the development of the simplex method by George B. Dantzig in 1947, linear programming has been extensively used in the military, industrial, governmental, and urban planning fields, among others. The...

Getting Started with Dwarf Fortress: Learn to play the most complex video game ever made
Getting Started with Dwarf Fortress: Learn to play the most complex video game ever made

Dwarf Fortress may be the most complex video game ever made, but all that detail makes for fascinating game play, as various elements collide in interesting and challenging ways. The trick is getting started. In this guide, Fortress geek Peter Tyson takes you through the basics of this menacing realm, and helps you overcome the...

Ballistic Trauma
Ballistic Trauma

Ballistic Trauma: A Practical Guide provides a concise guide to the clinical and operational issues surrounding the management of the ballistic casualty. The book crystallizes the knowledge and experience accrued by those dealing with ballistic trauma on a regular basis and extends this to those who have to manage these...

Statistics and Data with R: An applied approach through examples
Statistics and Data with R: An applied approach through examples
R, an Open Source software, has become the de facto statistical computing environment. It has an excellent collection of data manipulation and graphics capabilities. It is extensible and comes with a large number of packages that allow statistical analysis at all levels – from simple to advanced – and in numerous fields...
Wireless Sensor Networks: Signal Processing and Communications
Wireless Sensor Networks: Signal Processing and Communications

A wireless sensor network (WSN) uses a number of autonomous devices to cooperatively monitor physical or environmental conditions via a wireless network. Since its military beginnings as a means of battlefield surveillance, practical use of this technology has extended to a range of civilian applications including environmental monitoring,...

North Korea's Military-Diplomatic Campaigns, 1966-2008 (Routledge Security in Asia Pacific Series)
North Korea's Military-Diplomatic Campaigns, 1966-2008 (Routledge Security in Asia Pacific Series)

This book examines North Korea’s nuclear diplomacy over a long time period from the early 1960s, setting its dangerous brinkmanship in the wider context of North Korea’s military and diplomatic campaigns to achieve its political goals. It argues that the last four decades of military adventurism demonstrates Pyongyang’s...

Computational Red Teaming: Risk Analytics of Big-Data-to-Decisions Intelligent Systems
Computational Red Teaming: Risk Analytics of Big-Data-to-Decisions Intelligent Systems

Written to bridge the information needs of management and computational scientists, this book presents the first comprehensive treatment of Computational Red Teaming (CRT).  The author describes an analytics environment that blends human reasoning and computational modeling to design risk-aware and evidence-based smart decision making...

Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks (Wiley Corporate F&A)
Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks (Wiley Corporate F&A)

Conquering cyber attacks requires a multi-sector, multi-modalapproach

Cyber Threat! How to Manage the Growing Risk of CyberAttacks is an in-depth examination of the very real cybersecurity risks facing all facets of government and industry, andthe various factors that must align to maintain informationintegrity....

An Introduction to Ultra Wideband Communication Systems
An Introduction to Ultra Wideband Communication Systems

The definitive, end-to-end guide to high-performance UWB system design

With the FCC's approval of new ultra wideband standards, UWB is poised to drive breakthroughs in both commercial and military communications. However, UWB system design is radically different from...

Result Page: 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy