 |
|
 Airplane Flight Dynamics and Automatic Flight Controls Pt. 1
In this two-part textbook, methods are presented for analysis and synthesis of the steady state
and perturbed state (open and closed loop) stability and control of fixed wing aircraft.
Part I contains Chapters 1-6 and Appendices A-D. Part Ð contains Chapters 7-12 as well
as Appendix E.
The book is aimed at junior, senior... |  |  Airplane Flight Dynamics and Automatic Flight Controls: Part 2
In this two-part textbook, methods are presented for analysis and synthesis of the steady state
and perturbed state (open and closed loop) stability and control of fixed wing aircraft.
Part I contains Chapters 1-6 and Appendices A-D. Part II contains Chapters 7-12 as well
as Appendix E.
The book is aimed at junior, senior and... |  |  Design of Hashing Algorithms (Lecture Notes in Computer Science)
Historically, computer security is related to both cryptography and access
control in operating systems. Cryptography, although mostly applied in
the military and diplomacy, was used to protect communication channels
and storage facilities (especially the backups). In the seventies there was a
breakthrough in cryptography - the... |
|
|
|
|
Result Page: 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 |