 |
|
 An Introduction to Wavelet Modulated Inverters
The introductory chapter briefly presents the fundamental topologies and operation of power inverters. The second chapter contains a description of wavelet basis functions and sampling theory with particular reference to the switching model of inverters. Chapter three outlines the connection between the non-uniform sampling theorem and... |  |  Mastering Elasticsearch, Second Edition
Further your knowledge of the Elasticsearch server by learning more about its internals, querying, and data handling
About This Book
-
Understand Apache Lucene and Elasticsearch's design and architecture
-
Design your index, configure it, and distribute it, not only with assumptions, but...
|  |  Implementing Microsoft Dynamics AX 2012 with Sure Step 2012
Get to grips with AX 2012 and learn a whole host of tips and tricks to ensure project success
Overview
-
Get the confidence to implement AX 2012 projects effectively using the Sure Step 2012 Methodology.
-
Packed with practical real-world examples as well as helpful diagrams and images that...
|
|
 Delivering Sustainable Buildings: An Industry Insider's View
The UK government has committed to reducing the nation’s carbon emissions by 80% by 2050. Buildings currently use almost half of the UK’s generated energy and they are now the focus of an unprecedented drive to cut energy use in our homes, offices, schools, libraries – in fact in almost every building, public or private. ... |  |  Resilience Assessment and Evaluation of Computing Systems
The resilience of computing systems includes their dependability as well as their fault tolerance and security. It defines the ability of a computing system to perform properly in the presence of various kinds of disturbances and to recover from any service degradation. These properties are immensely important in a world where many aspects of... |  |  Developing and Evaluating Security-Aware Software Systems
As computer technologies continue to evolve and new security threats emerge, secure-aware software developments are essential in the software engineering field.
Developing and Evaluating Security-Aware Software Systems provides innovative ideas and methods on the development, operation, and maintenance of secure software... |
|
 Understanding Wind Power Technology: Theory, Deployment and Optimisation
Wind energy technology has progressed enormously over the last decade. In coming years it will continue to develop in terms of power ratings, performance and installed capacity of large wind turbines worldwide, with exciting developments in offshore installations.
Designed to meet the training needs of wind engineers, this... |  |  Aesthetic Surgery of the Abdominal Wall
We have come a long way since the days when abdominal wall contouring was p- formed by simple dermolipectomies, with no attention to diastasis correction and muscular reinforcement, and little regard for the final aesthetic result. Nowadays, an abdominoplasty may be indicated for even the most demanding of patients. Details such as placement... |  |  Software Maintenance Success Recipes
Dispelling much of the folklore surrounding software maintenance, Software Maintenance Success Recipes identifies actionable formulas for success based on in-depth analysis of more than 200 real-world maintenance projects. It details the set of factors that are usually present when effective software maintenance teams do... |
|
|
Result Page: 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 |