Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Polymers in Drug Delivery
Polymers in Drug Delivery

Together, the nano explosion and the genomic revolution are ushering in a new frontier in drug delivery. In recent years we’ve seen how polymers can play a crucial role in controlling the rate of drug release, enhancing solubility and uptake, and limiting degradation and toxicity. In the very near future, they may well be used to...

Functional Foods and Biotechnology (Food Science and Technology)
Functional Foods and Biotechnology (Food Science and Technology)

World-wide there are more overweight and obese people (1 billion) than there are malnourished (0.8 billion). Today the challenge lies not just in meeting basic nutritional needs, but providing additional protective ingredients to help prevent the major chronic diseases associated with obesity. Biotechnology has become an important tool in...

Wellbeing (The Art of Living)
Wellbeing (The Art of Living)

The politics of wellbeing and the new science of happiness have shot up the agenda since Martin Seligman coined the phrase "positive psychology". After all, who does not want to live the good life? So ten years on, why is it that much of this otherwise welcome debate sounds like as much apple-pie - "work less", "earn...

Computer Science: Notable Research and Discoveries (Frontiers of Science)
Computer Science: Notable Research and Discoveries (Frontiers of Science)
No one is certain how much more powerful and possibly intelligent computers will become in the 21st century. Exploring six prominent topics in computer science research, this title describes how computer scientists conduct research and attempt to formulate answers to important questions. Research published in journals, presented at conferences,...
Mastering Machine Learning Algorithms: Expert techniques to implement popular machine learning algorithms and fine-tune your models
Mastering Machine Learning Algorithms: Expert techniques to implement popular machine learning algorithms and fine-tune your models

Explore and master the most important algorithms for solving complex machine learning problems.

Key Features

  • Discover high-performing machine learning algorithms and understand how they work in depth
  • One-stop solution to mastering supervised, unsupervised, and...
Cryptography: Theory and Practice (Discrete Mathematics and Its Applications)
Cryptography: Theory and Practice (Discrete Mathematics and Its Applications)

My objective in writing this book was to produce a general, comprehensive textbook that treats all the essential core areas of cryptography. Although many books and monographs on cryptography have been written in recent years, the majority of them tend to address specialized areas of cryptography. On the other hand, many of the existing general...

Mobile Commerce Applications
Mobile Commerce Applications
Today, various m-commerce applications are increasingly enhancing enterprises' abilities to offer mobile services that are easily accessed by a mobile device anytime and anywhere. With the unique advantages of emerging mobile communications and wireless technologies, m-commerce applications are generally used to fulfill some tasks that are not...
Guide to RISC Processors: for Programmers and Engineers
Guide to RISC Processors: for Programmers and Engineers
Popular processor designs can be broadly divided into two categories: Complex Instruction
Set Computers (CISC) and Reduced Instruction Set Computers (RISC). The dominant
processor in the PC market, Pentium, belongs to the CISC category. However, the recent
trend is to use the RISC designs. Even Intel has moved from CISC to RISC
...
Grammatical Picture Generation: A Tree-Based Approach
Grammatical Picture Generation: A Tree-Based Approach
This book introduces the reader to the notions, the techniques, and the theory of grammatical picture generation, a research field focusing on formal systems that describe sets of pictures by means of syntactic rules. The book presents important types of picture generators, using a tree-based approach to stress their common algorithmic basis, the...
Data Mining the Web: Uncovering Patterns in Web Content, Structure, and Usage
Data Mining the Web: Uncovering Patterns in Web Content, Structure, and Usage
Learn How To Convert Web Data Into Web Knowledge

This text demonstrates how to extract knowledge by finding meaningful connections among data spread throughout the Web. Readers learn methods and algorithms from the fields of information retrieval, machine learning, and data mining which, when combined, provide a solid...

Getting Started with InstallShield Developer and Windows Installer Setups
Getting Started with InstallShield Developer and Windows Installer Setups
InstallShield Developer is the most powerful and flexible solution for creating today’s Windows Installer setups. And this book is your authoritative guide to this most critical step in the software release process: the installation.

InstallShield authority Bob Baker guides you through Developer’s integrated development environment...

Penetration Tester's Open Source Toolkit, Volume 2
Penetration Tester's Open Source Toolkit, Volume 2
Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This second volume adds over 300 new pen testing...
unlimited object storage image
Result Page: 423 422 421 420 419 418 417 416 415 414 413 412 411 410 409 408 407 406 405 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy