The Irrlicht Engine is a cross-platform high-performance real-time 3D engine written in C++. It features a powerful high-level API for creating complete 3D and 2D applications such as games or scientific visualizations.
Irrlicht 1.7.1 Realtime 3D Engine Beginner's Guide will teach you to master all that is required to create 2D and...
To meet telecommunications demands of the world community, it is crucial to employ radio services. Among vast and fast expansions during recent decades, the satellite services, navigational aids, remote sensing, telemetering, audio and video broadcasting, high-speed data communications, mobile radio systems, and some other special radio...
This paper initiates a mathematical theory of aeroelasticity centered on the canonical problem of the flutter boundary — an instability endemic to aircraft that limits attainable speed in the subsonic regime. We develop a continuum mathematical model that exhibits the known flutter phenomena and yet is amenable to analysis...
A+ Exam Cram 2 is a study skill enhancement and tutorial, designed to focus on exactly what students need to get A+ certified, with coverage of exams 220-221 and 220-222. It details all the new exam objectives and items in the following areas: Windows 98, Windows 2000, and Windows NT version 4.0. Because the A+ certification is a core competency...
Value and trust are two of the biggest question marks in today's tumultuous stock markets. Value because investors burned by the recent tech collapse are once again insisting that stocks provide some meat along with the sizzle, and trust because--for obvious reasons--investors...
With the advent of the internet as a medium for performing business transactions, the need for a secure communication channel has never been more paramount. The study of behavioral biometrics - the verification and/or identification of individuals based on the way they provide information to an authentication system - originated from the need...
Security continues to be the number-one concern of computer professionals today, and with good reason. Consider the evidence: as many as 150 million computers worldwide may be remotely controlled by attackers. Over 94 million credit and debit cards were compromised in one data security breach, with losses totaling over $140 million. On average,...
This text for students and professionals in computer science provides a valuable overview of current knowledge concerning parallel algorithms. These computer operations have recently acquired increased importance due to their ability to enhance the power of computers by permitting multiple processors to work on different parts of a problem...
This book/lecture is intended for a college freshman level class in problem solving, where the particular problems deal with electrical and electronic circuits. It can also be used in a junior/senior level class in high school to teach circuit analysis. The basic problem-solving paradigm used in this book is that of resolution of a problem...
As medical devices become more intricate, with an increasing number of components made from a wide range of materials, it is important that they meet stringent requirements to ensure that they are safe to be implanted and will not be rejected by the human body. Joining and assembly of medical materials and devices provides a comprehensive...
BizTalk Server 2002 Design and Implementation shows developers how to write BizTalk Server 2002 applications by example. Readers will learn BizTalk Server 2002 step-by-step as they read through the chapters and build an actual BizTalk Server application. Readers will also be exposed to the many invaluable lessons that Xin...
Create web-based VR applications and deploy them to GitHub pages with this short, practical tutorial crammed with hands-on examples. This book covers topics such as VR, the WebVR API, and A-Frame. In Learning Web-based Virtual Reality, you will build a number of 3D VR-based applications. In these apps, you will be able to test the VR...