Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Advances in Fuzzy Object-Oriented Databases: Modeling and Applications
Advances in Fuzzy Object-Oriented Databases: Modeling and Applications
Collecting the latest research results from the leading researchers in the field of fuzzy object-oriented databases, Advances in Fuzzy Object-Oriented Databases: Modeling and Applications provide a single source for current research and practical applications in fuzzy object-oriented databases. This book includes major aspects of fuzzy...
Meshing, Geometric Modeling and Numerical Simulation, Volume 2: Metrics, Meshes and Mesh Adaptation (Geometric Modeling and Applications)
Meshing, Geometric Modeling and Numerical Simulation, Volume 2: Metrics, Meshes and Mesh Adaptation (Geometric Modeling and Applications)

Triangulations, and more precisely meshes, are at the heart of many problems relating to a wide variety of scientific disciplines, and in particular numerical simulations of all kinds of physical phenomena. In numerical simulations, the functional spaces of approximation used to search for solutions are defined from meshes, and in...

System Analysis, Design, and Development : Concepts, Principles, and Practices
System Analysis, Design, and Development : Concepts, Principles, and Practices
Learn to develop systems that meet customer needs and organizational objectives

Successful system development requires formulation and implementation of a sound technical strategy that accurately translates the user's operational needs into a physical solution to comply with their specifications and contract requirements. System Analysis,...

Hack Proofing Your Identity
Hack Proofing Your Identity
The use of a seal, card, or other identification while making a purchase or signing
a contract is a custom almost as old as history. As merchants and their customers
have begun using the Internet in recent years to conduct business online, they
have been challenged to find digital forms of identification that mimic traditional,...
100 Challenging Spinal Pain Syndrome Cases
100 Challenging Spinal Pain Syndrome Cases

The new edition of 50 Challenging Spinal Pain Syndrome Cases brings together a total of 100 individual studies ranging from the common and comparatively straightforward to the more complex. Content is presented in a clear layout with details of case history, aetiology, physical examination, imaging and, when necessary, laboratory test results...

Creep and Fracture of Ice
Creep and Fracture of Ice

This is the first complete account of the physics of the creep and fracture of ice, and their interconnectivity. It investigates the deformation of low-pressure ice, which is fundamental to glaciers, polar ice sheets and the uppermost region of icy moons of the outer Solar System. The book discusses ice structure and its defects, and...

Unauthorised Access: Physical Penetration Testing For IT Security Teams
Unauthorised Access: Physical Penetration Testing For IT Security Teams

The first guide to planning and performing a physical penetration test on your computer's security

Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT teams perform a variety of network and application...

Introduction to Real Analysis, 3rd Edition
Introduction to Real Analysis, 3rd Edition

In recent years, mathematics has become valuable in many areas, including economics and management science as well as the physical sciences, engineering and computer science. Therefore, this book provides the fundamental concepts and techniques of real analysis for readers in all of these areas. It helps one develop the ability to think...

Game Development with Three.js
Game Development with Three.js

With Three.js you can create sophisticated 3D games that run in the web browser. This book is aimed at both the professional game designer and the enthusiast with a step by step approach including lots of tips and examples.

Overview

  • Develop immersive 3D games that anyone can play on the Internet
  • ...
Cognitive Radio Technology (Communications Engineering)
Cognitive Radio Technology (Communications Engineering)
Cognitive radio technology is a smarter, faster, and more efficient way to transmit information to and from fixed, mobile, other wireless communication devices. Cognitive radio builds upon software-defined radio technology. A cognitive radio system is 'aware' of its operating environment and automatically adjusts itself to maintain desired...
FPGA Prototyping by VHDL Examples: Xilinx Spartan-3 Version
FPGA Prototyping by VHDL Examples: Xilinx Spartan-3 Version

HDL (hardware description language) and FPGA (field-programmable gate array) devices allow designers to quickly develop and simulate a sophisticated digital circuit, realize it on a prototyping device, and verify operation of the physical implementation. As these technologies mature, they have become mainstream practice. We can now use a PC...

Operative Treatment of Elbow Injuries
Operative Treatment of Elbow Injuries

Operative Treatment of Elbow Injuries is a complete presentation of all surgical approaches to repair of the elbow, demonstrating the most effective management of elbow injuries and problems. Drs. Plancher and Baker have assembled a group of well-known experts to write on the various procedures. Each contributor for each chapter discusses...

unlimited object storage image
Result Page: 126 125 124 123 122 121 120 119 118 117 116 115 114 113 112 111 110 109 108 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy