Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Multiplexed Networks for Embedded Systems: CAN, LIN, FlexRay, Safe-by-Wire...
Multiplexed Networks for Embedded Systems: CAN, LIN, FlexRay, Safe-by-Wire...

Multiplexed networks are essential for the unified, efficient and cost-effective exchange of electronic information within embedded component systems. This is especially important in automotive manufacturing as vehicles become increasingly reliant on robust electronic networks and systems for improved reliability, anti-lock brake systems (ABS),...

RFID-A Guide to Radio Frequency Identification
RFID-A Guide to Radio Frequency Identification
This book provides an introduction to RFID technology. It describes and addresses the following: How RFID works, how it is and can be used in current and future applications. The History of RFID technology, the current state of practice and where RFID is expected to be taken in the future. The role of middleware software to route data between the...
Advanced Technologies in Robotics and Intelligent Systems: Proceedings of ITR 2019 (Mechanisms and Machine Science)
Advanced Technologies in Robotics and Intelligent Systems: Proceedings of ITR 2019 (Mechanisms and Machine Science)

This volume gathers the latest advances, innovations, and applications in the field of intelligent systems such as robots, cyber-physical and embedded systems, as presented by leading international researchers and engineers at the International Conference on Intelligent Technologies in Robotics (ITR), held in Moscow, Russia on...

Encyclopedia of Mobile Computing and Commerce
Encyclopedia of Mobile Computing and Commerce
Nowadays, mobile communication, mobile devices, and mobile computing are widely available. Everywhere people are carrying mobile devices, such as mobile phones. The availability of mobile communication networks has made a huge impact to various applications, including commerce. Consequently, there is a strong relationship between mobile computing...
Handbook of Enterprise Integration
Handbook of Enterprise Integration

Maintaining compatibility among all affected network and application interfaces of modern enterprise systems can quickly become costly and overwhelming. This handbook presents the knowledge and practical experience of a global group of experts from varying disciplines to help you plan and implement enterprise integration projects that respond...

Multivariate Public Key Cryptosystems (Advances in Information Security)
Multivariate Public Key Cryptosystems (Advances in Information Security)

Multivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years, MPKC schemes have increasingly been seen as a possible alternative to number theoretic-based cryptosystems such as RSA, as they are generally more efficient in terms of computational effort. As quantum computers are developed, MPKC...

Beacon Technologies: The Hitchhiker's Guide to the Beacosystem
Beacon Technologies: The Hitchhiker's Guide to the Beacosystem

Learn the key standards―iBeacon, Eddystone, Bluetooth 4.0, and AltBeacon―and how they work with other proximity technologies. Then build your understanding of the proximity framework and how to identify and deploy the best solutions for your own business, institutional, or consulting needs.

Proximity technology―in...

Wireless Sensor Networks: Technology, Protocols, and Applications
Wireless Sensor Networks: Technology, Protocols, and Applications
Infrastructure for Homeland Security Environments

Wireless Sensor Networks helps readers discover the emerging field of low-cost standards-based sensors that promise a high order of spatial and temporal resolution and accuracy in an ever-increasing universe of applications. It shares the latest advances in science and engineering paving the way...

Antennas: From Theory to Practice
Antennas: From Theory to Practice

Practical, concise and complete reference for the basics of modern antenna design

Antennas: from Theory to Practice discusses the basics of modern antenna design and theory. Developed specifically for engineers and designers who work with radio communications, radar and RF engineering, this...

Techno Security's Guide to Managing Risks for IT Managers, Auditors and Investigators
Techno Security's Guide to Managing Risks for IT Managers, Auditors and Investigators
This book contains some of the most up-to-date information available anywhere on a wide variety of topics related to Techno Security. As you read the book, you will notice that the authors took the approach of identifying some of the risks, threats, and vulnerabilities and then discussing the countermeasures to address them. Some of the topics and...
Developing Practical Wireless Applications
Developing Practical Wireless Applications
In a constant stream of new ideas, wireless technologies continue to emerge offering a range of capabilities, each affording simplicity and ease-of-use. Such diversity and choice should surely beg the question, are manufacturers using the right technology for the right product?

Developing Practical Wireless Applications will explore
...
Raspberry Pi IoT Projects: Prototyping Experiments for Makers
Raspberry Pi IoT Projects: Prototyping Experiments for Makers

Build your own Internet of Things (IoT) projects for prototyping and proof-of-concept purposes. This book contains the tools needed to build a prototype of your design, sense the environment, communicate with the Internet (over the Internet and Machine to Machine communications) and display the results.

Raspberry Pi IoT...

unlimited object storage image
Result Page: 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy