Home | Amazing | Today | Tags | Publishers | Years | Search 
Increasing Perceptual Skills of Robots Through Proximal Force/Torque Sensors: A Study for the Implementation of Active Compliance on the iCub Humanoid Robot (Springer Theses)
Increasing Perceptual Skills of Robots Through Proximal Force/Torque Sensors: A Study for the Implementation of Active Compliance on the iCub Humanoid Robot (Springer Theses)

This thesis proposes an effective methodology for enhancing the perceptual capabilities and achieving interaction control of the iCub humanoid robot. The method is based on the integration of measurements from different sensors (force/torque, inertial and tactile sensors) distributed along the robot’s kinematic chain. Humanoid robots...

Sustainable and Safe Nuclear Fission Energy: Technology and Safety of Fast and Thermal Nuclear Reactors (Power Systems)
Sustainable and Safe Nuclear Fission Energy: Technology and Safety of Fast and Thermal Nuclear Reactors (Power Systems)

Unlike existing books of nuclear reactor physics, nuclear engineering and nuclear chemical engineering this book covers a complete description and evaluation of nuclear fission power generation. It covers the whole nuclear fuel cycle, from the extraction of natural uranium from ore mines, uranium conversion and enrichment up to the...

Cuckoo Malware Analysis
Cuckoo Malware Analysis

Analyze malware using Cuckoo Sandbox

Overview

  • Learn how to analyze malware in a straightforward way with minimum technical skills
  • Understand the risk of the rise of document-based malware
  • Enhance your malware analysis concepts through illustrations, tips and tricks,...
Cryptography: Cracking Codes (Intelligence and Counterintelligence)
Cryptography: Cracking Codes (Intelligence and Counterintelligence)

While cracking a code might seem like something few of us would encounter in our daily lives, it is actually far more prevalent than we may realize. Anyone who has had personal information taken because of a hacked email account can understand the need for cryptography and the importance of encryptionessentially the need to code information...

Allergens and Allergen Immunotherapy: Subcutaneous, Sublingual, and Oral, Fifth Edition
Allergens and Allergen Immunotherapy: Subcutaneous, Sublingual, and Oral, Fifth Edition

This fifth edition of the bestselling Allergens and Allergen Immunotherapy is now completely updated and revised to include subcutaneous, sublingual, and oral immunomodulator treatments of allergic disease.

The redesigned book continues to provide comprehensive coverage of all types of allergens and allergen vaccines, giving...

Chemical Analysis of Antibiotic Residues in Food
Chemical Analysis of Antibiotic Residues in Food

An insightful exploration of the key aspects concerning the chemical analysis of antibiotic residues in food

The presence of excess residues from frequent antibiotic use in animals is not only illegal, but can pose serious health risks by contaminating products for human consumption such as meat and milk. Chemical...

Knots: The Complete Visual Guide
Knots: The Complete Visual Guide
Knots have been used throughout history, and they remain a valuable resource today. Learning to tie knots is a handy, enjoyable skill, requiring only simple equipment to get started.

This book contains a selection of knots intended to be practical and instructive. Many of them have specific purposes,
...
Totally Implantable Venous Access Devices
Totally Implantable Venous Access Devices

Since their first application in 1982, Totally Implantable Venous Access Devices (TIVADs) have become increasingly important in the clinical practice, as more intensive chemotherapy and parenteral treatments have come into use. At this time, there is objective evidence that TIVADs are a safe, effective strategy for long-term venous access;...

Python in Practice: Create Better Programs Using Concurrency, Libraries, and Patterns (Developer's Library)
Python in Practice: Create Better Programs Using Concurrency, Libraries, and Patterns (Developer's Library)

Winner of the 2014 Jolt Award for "Best Book"

 

“Whether you are an experienced programmer or are starting your career, Python in Practice is full of valuable advice and example to help you improve your craft by thinking about...

Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats
Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats

Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to...

Bioeffects and Therapeutic Applications of Electromagnetic Energy
Bioeffects and Therapeutic Applications of Electromagnetic Energy

From cell phones to treating cancer, EM energy plays a part in many of the innovations that we take for granted everyday. A basic force of nature, like nuclear energy or gravity, this energy can be harnessed and used, but still holds the potential to be harmful. The question remains, how safe are EM products? Bioeffects and Therapeutic...

Understanding Cosmetic Laser Surgery (Understanding Health and Sickness Series)
Understanding Cosmetic Laser Surgery (Understanding Health and Sickness Series)

Sunlight and gravity cause facial aging. Lasers enable safe and predictable resurfacing to smooth facial wrinkles as well as surgery to remove aging tissue from eyelids while minimizing bruising. Lasers can also eliminate excess blood vessels and unwanted hair, and erase tattoos without...

Result Page: 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy