Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Introduction to Chemical Engineering Kinetics & Reactor Design
Introduction to Chemical Engineering Kinetics & Reactor Design
One feature that distinguishes the education of the chemical engineer from that of other engineers is an exposure to the basic concepts of chemical reaction kinetics and chemical reactor design. This textbook provides a judicious introductory level overview of these subjects. Emphasis is placed on the aspects of chemical kinetics and material and...
Physics for Scientists and Engineers (with PhysicsNOW and InfoTrac )
Physics for Scientists and Engineers (with PhysicsNOW and InfoTrac )

This best-selling, calculus-based text is recognized for its carefully crafted, logical presentation of the basic concepts and principles of physics. PHYSICS FOR SCIENTISTS AND ENGINEERS, Sixth Edition, maintains the Serway traditions of concise writing for the students, carefully thought-out problem sets and worked examples, and evolving...

Assemble the Social Web with zembly
Assemble the Social Web with zembly

Use zembly to Create Social Web Applications for: Facebook, Flickr, iPhone, and More!

With zembly you can create mashups and web applications drawing on content from virtually any web site, API call, or data stream. What’s more, zembly makes it as easy to deploy and scale next-generation web applications as it is
...

Heuristic Search: Theory and Applications
Heuristic Search: Theory and Applications

Search has been vital to artificial intelligence from the very beginning as a core technique in problem solving. The authors present a thorough overview of heuristic search with a balance of discussion between theoretical analysis and efficient implementation and application to real-world problems. Current developments in search such as...

The Law and Economics of Cybersecurity
The Law and Economics of Cybersecurity

Cybersecurity is a leading national problem for which the market may fail to produce a solution because individuals often select less than optimal security levels in a world of positive transaction costs. The problem is compounded because the insecure networks extend far beyond the regulatory jurisdiction of any one nation or even coalition...

Prevention of Blindness from Diabetes Mellitus: Report of a WHO Consultation
Prevention of Blindness from Diabetes Mellitus: Report of a WHO Consultation

Diabetes mellitus is an important public health problem worldwide, and more than 75% of patients who have had diabetes mellitus for more than 20 years will have some sort of retinopathy. Diabetic retinopathy correlates with the duration of diabetes; thus with increasing life expectancy, diabetic retinopathy and the ensuing blindness will tend...

The Emotion Thesaurus: A Writer's Guide To Character Expression
The Emotion Thesaurus: A Writer's Guide To Character Expression
One of the biggest problem areas for writers is conveying a character's emotions to the reader in a unique, compelling way. This book comes to the rescue by highlighting 75 emotions and listing the possible body language cues, thoughts, and visceral responses for each. Using its easy-to-navigate list format, readers can draw inspiration from...
The Toyota Way: 14 Management Principles From The World's Greatest Manufacturer
The Toyota Way: 14 Management Principles From The World's Greatest Manufacturer

What Can Your Business Learn From Toyota?

  • Double or triple the speed of any business process
  • Build quality into workplace systems
  • Eliminate the huge costs of hidden waste
  • Turn every employee into a quality control inspector

With a market capitalization greater...

Image Processing Using Pulse-Coupled Neural Networks
Image Processing Using Pulse-Coupled Neural Networks
Humans have an outstanding ability to recognise, classify and discriminate
objects with extreme ease. For example, if a person was in a large classroom
and was asked to find the light switch it would not take more than a second or
two. Even if the light switch was located in a different place than the human
expected or it was
...
Linux Network Security (Administrator's Advantage Series)
Linux Network Security (Administrator's Advantage Series)

Linux networks are becoming more and more common, but security is often an overlooked issue. Unfortunately, in today’s environment all networks are potential hacker targets, from top-secret military research networks to small home LANs. Linux Network Security focuses on securing Linux in a networked environment, where the security...

Articulation and Intelligibility (Synthesis Lectures on Speech and Audio Processing)
Articulation and Intelligibility (Synthesis Lectures on Speech and Audio Processing)
This lecture is a review of what is known about modeling human speech recognition (HSR). A model is proposed, and data are tested against the model.

There seem to be a large number of theories, or points of view, on how human speech recognition functions, yet few of these theories are comprehensive. What is needed is a set of models that are...

How to Cheat in Adobe Flash CS5: The Art of Design and Animation
How to Cheat in Adobe Flash CS5: The Art of Design and Animation

Need to solve problems quickly to develop creative projects to time and to budget? Want to hone your Flash skills so you can concentrate on your animation? Then How to Cheat in Flash is for you! Chris Georgenes shows how to work from the problem to the solution - from the viewpoint of an animator who has been commissioned to create a job and...

unlimited object storage image
Result Page: 238 237 236 235 234 233 232 231 230 229 228 227 226 225 224 223 222 221 220 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy