|
|
|
|
| | Learning Robotics using Python: Design, simulate, program, and prototype an autonomous mobile robot using ROS, OpenCV, PCL, and Python, 2nd Edition
Design, simulate, and program interactive robots
Key Features
-
Design, simulate, build, and program an interactive autonomous mobile robot
-
Leverage the power of ROS, Gazebo, and Python to enhance your robotic skills
-
A hands-on guide to creating an...
| | |
|
Linux Essentials
Learn Linux, and take your career to the next level!
Linux Essentials, 2nd Edition provides a solid foundation of knowledge for anyone considering a career in information technology, for anyone new to the Linux operating system, and for anyone who is preparing to sit for the Linux Essentials Exam. Through... | | GNSS Receivers for Weak Signals
Many important GPS applications such as the positioning of wireless devices, tracking during ionospheric scintillation, and orbit determination of geostationary and high Earth orbit satellites require a GNSS (global navigation satellite system) receiver with the ability to work with weak signals. This first-of-its-kind book addresses this... | | Microsoft Dynamics CRM 2011 Scripting Cookbook
Over 50 recipes to extend system customization in Dynamics CRM 2011 through client-side scripting
Overview
-
Learn the basics of client-side customization and delve deeper into advanced topics at your own pace
-
Understand the basic customization model supported by the product.
-
A...
|
|
|
| | Engineering Mathematics
-
Colour layout helps navigation and highlights key learning points, formulae and exercises
-
Fully up-to-date with Levels 2 and 3 of the BTEC Engineering Specifications
-
Containing 1000 worked problems, 1750 further problems and 238 multiple-choice questions and answers
-
Real-world situations
... | | Embedded Java Security: Security for Mobile DevicesThis book is a comprehensive presentation of embedded Java security (namely, J2ME CLDC/MIDP), in the sense that the security model of embedded Java is thoroughly explained, then a detailed analysis of this model is undertaken. It is compared with the security model of Java Standard Edition in order to view the impact of limited resources (typically... |
|
|
Result Page: 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 |