Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Plunkett's Wireless, Wi-Fi, RFID & Cellular Industry Almanac 2011
Plunkett's Wireless, Wi-Fi, RFID & Cellular Industry Almanac 2011

Rapid development of new technologies is leading to ever more versatile, multipurpose mobile devices, including 3G and 4G Internet-enabled cell phones. Wireless networking and wireless Internet access are developing and expanding on a global basis at a rapid rate. Meanwhile, RFID (radio frequency identification) will revolutionize wireless...

Chipless RFID: Design Procedure and Detection Techniques
Chipless RFID: Design Procedure and Detection Techniques

This book examines the design of chipless RFID systems. The authors begin with the philosophy of RFID and its effect on commercial applications. Then, they discuss the chipless RFID systems and the application of chipless RFID systems, the advantages it provides compared to conventional barcode ID and chipped RFID tags. The text then covers...

Practical Arduino: Cool Projects for Open Source Hardware (Technology in Action)
Practical Arduino: Cool Projects for Open Source Hardware (Technology in Action)

Create your own Arduino-based designs, gain in-depth knowledge of the architecture of Arduino, and learn the user-friendly Arduino language all in the context of practical projects that you can build yourself at home. Get hands-on experience using a variety of projects and recipes for everything from home automation to test equipment.

...
Probabilistic Databases (Synthesis Lectures on Data Management)
Probabilistic Databases (Synthesis Lectures on Data Management)
Probabilistic databases are databases where the value of some attributes or the presence of some records are uncertain and known only with some probability. Applications in many areas such as information extraction, RFID and scientific data management, data cleaning, data integration, and financial risk assessment produce large volumes of...
RFID in Manufacturing
RFID in Manufacturing
Information systems for manufacturing often follow a three-layer architecture based on an enterprise resource planning (ERP) layer (for order planning), a manufacturing execution system (MES) layer (for factory control), and a shop floor layer (for machine control). Future requirements on flexibility and adaptability require a much closer...
Soft Computing in XML Data Management: Intelligent Systems from Decision Making to Data Mining
Soft Computing in XML Data Management: Intelligent Systems from Decision Making to Data Mining

Being the de-facto standard for data representation and exchange over the Web, XML (Extensible Markup Language) allows the easy development of applications that exchange data over the Web. This creates a set of data management requirements involving XML. XML and related standards have been extensively applied in many business, service, and...

Accounting Best Practices (Wiley Best Practices)
Accounting Best Practices (Wiley Best Practices)

The accounting department is a cost center. It does not directly generate revenues, but, rather, provides a fi xed set of services to the rest of the company, and is asked to do so at the lowest possible cost. Consequently, the accounting staff is called on to process transactions, write reports, create new processes, or investigate old...

RFID Handbook: Fundamentals and Applications in Contactless Smart Cards, Radio Frequency Identification and Near-Field Communication
RFID Handbook: Fundamentals and Applications in Contactless Smart Cards, Radio Frequency Identification and Near-Field Communication

This is the third revised edition of the established and trusted RFID Handbook; the most comprehensive introduction to radio frequency identification (RFID) available.

This essential new edition contains information on electronic product code (EPC) and the EPC global network, and explains near-field communication (NFC) in...

Techno Security's Guide to Managing Risks for IT Managers, Auditors and Investigators
Techno Security's Guide to Managing Risks for IT Managers, Auditors and Investigators
This book contains some of the most up-to-date information available anywhere on a wide variety of topics related to Techno Security. As you read the book, you will notice that the authors took the approach of identifying some of the risks, threats, and vulnerabilities and then discussing the countermeasures to address them. Some of the topics and...
Developing Practical Wireless Applications
Developing Practical Wireless Applications
In a constant stream of new ideas, wireless technologies continue to emerge offering a range of capabilities, each affording simplicity and ease-of-use. Such diversity and choice should surely beg the question, are manufacturers using the right technology for the right product?

Developing Practical Wireless Applications will explore
...
Raspberry Pi IoT Projects: Prototyping Experiments for Makers
Raspberry Pi IoT Projects: Prototyping Experiments for Makers

Build your own Internet of Things (IoT) projects for prototyping and proof-of-concept purposes. This book contains the tools needed to build a prototype of your design, sense the environment, communicate with the Internet (over the Internet and Machine to Machine communications) and display the results.

Raspberry Pi IoT...

RFID Field Guide : Deploying Radio Frequency Identification Systems
RFID Field Guide : Deploying Radio Frequency Identification Systems

Whatever your industry or application, RFID Field Guide is your comprehensive guide to planning, designing, and deploying RFID technologies. Two leading RFID consultants draw on their extensive experience to cut through the hype associated with RFID technology...

unlimited object storage image
Result Page: 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy