Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Multi-Objective Optimization in Computer Networks Using Metaheuristics
Multi-Objective Optimization in Computer Networks Using Metaheuristics
Many new multicast applications emerging from the Internet, such as Voice-over-IP (VoIP), videoconference, TV over the Internet, radio over the Internet, video streaming multipoint, etc., have the following resource requirements: bandwidth consumption, end-to-end delay, delay jitter, packet loss ratio, and so forth. It is therefore necessary to...
Broadcast Announcing Worktext, Third Edition: A Media Performance Guide (Book & CD Rom)
Broadcast Announcing Worktext, Third Edition: A Media Performance Guide (Book & CD Rom)
This book provides the aspiring broadcast performer with the skills, techniques, and procedures necessary to enter this highly competitive field. In addition to the principles of good performance, this text addresses the importance of audience and how to change message to communicate effectively to various groups. Television and radio studio...
GSM Switching, Services, and Protocols
GSM Switching, Services, and Protocols
"...it misses the explanation of why GSM is composed as it is and as a result mostly has value as a reference work." -- IEE Review March, 1999 --This text refers to an out of print or unavailable edition of this title.

Since the publication of the first edition the number of GSM subscribers has
...
GPRS Networks
GPRS Networks
GPRS is principally an overlay network for existing GSM networks which enables all the benefits of packet switched networks to be available to mobile devices. Due to the delay in 3G rollout, operators worldwide are increasingly implementing services based on GPRS, once seen by many as simply a stepping-stone between GSM and UMTS.  If you are...
Information Warfare: How to Survive Cyber Attacks
Information Warfare: How to Survive Cyber Attacks

"Computers don't attack computers, people do. With Erbschloe's capability taxonomy, we see that there are plenty of new adversaries out there with increasingly powerful cyberweapons and intentions. But most importantly, the greatest threat still comes from "trusted" insiders we so desperately need to, but perhaps shouldn't, trust...

Semiconductors and the Information Revolution: Magic Crystals that made IT Happen
Semiconductors and the Information Revolution: Magic Crystals that made IT Happen
This book sets out to explain the development of modern electronic systems and devices from the viewpoint of the semiconductor materials (germanium, silicon, gallium arsenide and many others) which made them possible. It covers the scientific understanding of these materials and its intimate relationship with their technology and many applications....
Industrial Electronics for Engineers, Chemists, and Technicians: With Optional Lab Experiments
Industrial Electronics for Engineers, Chemists, and Technicians: With Optional Lab Experiments

Turn to this multipurpose reference for a practical understanding of electronics in the factory or laboratory. It's perfect for people who are not electrical engineers but who need to use electronic equipment every day at work. Avoid or solve common problems in the use of electronics in the factory or lab and optimize the use of...

Five-Star Apps: The best iPhone and iPad apps for work and play
Five-Star Apps: The best iPhone and iPad apps for work and play

What makes a five-star app? A program has to be interesting, even if the task it’s performing is routine. When you look at a dozen apps that have the same informational, utilitarian, or entertainment goal, five-star apps have that extra something special that floats to the top.

It can be a concierge, camera, flashlight, game...

Understanding Stocks
Understanding Stocks

The First Book for People Who Want to Make Serious Money In the Stock Market Without Becoming an Expert

History has proven that the surest road to long-term wealth is through investing in the stock market. And while you don't have to be a financial genius to invest well, you do have to care enough about your money to...

Lattice-Based Public-Key Cryptography in Hardware (Computer Architecture and Design Methodologies)
Lattice-Based Public-Key Cryptography in Hardware (Computer Architecture and Design Methodologies)
This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags to powerful desktop computers. It investigates implementation aspects of post...
Digital Synthesizers and Transmitters for Software Radio
Digital Synthesizers and Transmitters for Software Radio
The approach adopted in this book will, it is hoped, provide an understanding
of key areas in the field of digital synthesizers and transmitters. It is easy
to include different digital techniques in the digital synthesizers and transmitters
by using digital signal processing methods, because the signal is in
digital form. By
...
Mobile WiMAX: Toward Broadband Wireless Metropolitan Area Networks
Mobile WiMAX: Toward Broadband Wireless Metropolitan Area Networks
The Wireless Metropolitan Area Network (WirelessMAN) is a promising Broadband Wireless Access (BWA) technology that provides high-speed, high-bandwidth efficiency and high-capacity multimedia services for both residential and enterprise applications. Mobile WiMAX: Toward Broadband Wireless Metropolitan Area Networks examines the basic concepts,...
unlimited object storage image
Result Page: 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy