Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Wireless Sensor Networks: Signal Processing and Communications
Wireless Sensor Networks: Signal Processing and Communications

A wireless sensor network (WSN) uses a number of autonomous devices to cooperatively monitor physical or environmental conditions via a wireless network. Since its military beginnings as a means of battlefield surveillance, practical use of this technology has extended to a range of civilian applications including environmental monitoring,...

North Korea's Military-Diplomatic Campaigns, 1966-2008 (Routledge Security in Asia Pacific Series)
North Korea's Military-Diplomatic Campaigns, 1966-2008 (Routledge Security in Asia Pacific Series)

This book examines North Korea’s nuclear diplomacy over a long time period from the early 1960s, setting its dangerous brinkmanship in the wider context of North Korea’s military and diplomatic campaigns to achieve its political goals. It argues that the last four decades of military adventurism demonstrates Pyongyang’s...

Computational Red Teaming: Risk Analytics of Big-Data-to-Decisions Intelligent Systems
Computational Red Teaming: Risk Analytics of Big-Data-to-Decisions Intelligent Systems

Written to bridge the information needs of management and computational scientists, this book presents the first comprehensive treatment of Computational Red Teaming (CRT).  The author describes an analytics environment that blends human reasoning and computational modeling to design risk-aware and evidence-based smart decision making...

Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks (Wiley Corporate F&A)
Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks (Wiley Corporate F&A)

Conquering cyber attacks requires a multi-sector, multi-modalapproach

Cyber Threat! How to Manage the Growing Risk of CyberAttacks is an in-depth examination of the very real cybersecurity risks facing all facets of government and industry, andthe various factors that must align to maintain informationintegrity....

An Introduction to Ultra Wideband Communication Systems
An Introduction to Ultra Wideband Communication Systems

The definitive, end-to-end guide to high-performance UWB system design

With the FCC's approval of new ultra wideband standards, UWB is poised to drive breakthroughs in both commercial and military communications. However, UWB system design is radically different from...

Open Source GIS: A GRASS GIS Approach (The International Series in Engineering and Computer Science)
Open Source GIS: A GRASS GIS Approach (The International Series in Engineering and Computer Science)
GRASS GIS software was developed in response to the need for improved
analysis of landscape “trade offs” in managing government lands and the
emerging potential of computer-based land analysis tools. During the last
decades of the 20th century, government land managers in the U.S. (and
across the world) faced
...
Wi-Fi, Bluetooth, Zigbee and WiMax
Wi-Fi, Bluetooth, Zigbee and WiMax
The advent of ubiquitous computing and the proliferation of portable computing devices have raised the importance of mobile and wireless networking. Recently, there has been a tremendous interest in broadband wireless access systems, including wireless local area networks (WLANs), broadband wireless access, and wireless personal area networks...
Wireless Sensor Network Designs
Wireless Sensor Network Designs
Wireless Sensors are small, cheap, low maintenance and will revolutionize wireless communications.

’Wireless sensor networks’ is a rapidly growing discipline with new technologies emerging, new applications being developed and standards being finalized. Sensors and actuators allow for entirely new kinds of...

Handbook of Financial Cryptography and Security
Handbook of Financial Cryptography and Security

Cryptography has made a peculiar journey to become a modern science. It had long been associated with the military and with magic. The rst published work in the eld was Steganographia, by an alchemist named Trithemius. Although written earlier, the book was published in 1606. Cryptography has continued this connection with the arcane...

Arctic Security in an Age of Climate Change
Arctic Security in an Age of Climate Change

This is the first book to examine Arctic defense policy and military security from the perspective of all eight Arctic states. In light of climate change and melting ice in the Arctic Ocean, Canada, Russia, Denmark (Greenland), Norway, and the United States, as well as Iceland, Sweden, and Finland, are grappling with an emerging Arctic...

The SAGE Encyclopedia of Trans Studies
The SAGE Encyclopedia of Trans Studies
Transgender studies, broadly defined, has become increasingly prominent as a field of study over the past several decades, particularly in the last ten years. The experiences and rights of trans people have also increasingly become the subject of news coverage, such as the ability of trans people to access restrooms, their...
Multi-Sensor Data Fusion with MATLAB®
Multi-Sensor Data Fusion with MATLAB®

Using MATLAB® examples wherever possible, Multi-Sensor Data Fusion with MATLAB explores the three levels of multi-sensor data fusion (MSDF): kinematic-level fusion, including the theory of DF; fuzzy logic and decision fusion; and pixel- and feature-level image fusion. The authors elucidate DF...

unlimited object storage image
Result Page: 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy