Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
BioMEMS and Biomedical Nanotechnology
BioMEMS and Biomedical Nanotechnology
Numerous miniaturized DNA microarray, DNA chip, Lab on a Chip and biosensor devices have been developed and commercialized. Such devices are improving theway many important genomic and proteomic analyses are performed in both research and clinical diagnostic laboratories. The development of these technologies was enabled by a...
The Compatibility Gene: How Our Bodies Fight Disease, Attract Others, and Define Our Selves
The Compatibility Gene: How Our Bodies Fight Disease, Attract Others, and Define Our Selves

This is the story of a few human genes and how we discovered what these genes do. We each have around 25,000 genes, but the genes in this story are those that vary the most from person to person. These genes--called compatibility genes--are, in effect, a molecular signature that distinguishes each of us as individuals. Davis tells the...

Blood: Physiology and Circulation (The Human Body)
Blood: Physiology and Circulation (The Human Body)
Humans have been fascinated by the intricacies of blood as far back as early Egyptian civilization. Tombs in Egypt depicted bloodletting—a procedure through which blood is intentionally removed from a vein—as a treatment for sick patients. Some ancient Greeks drank the blood of a fallen warrior, believing that...
Natriuretic Peptides: The Hormones of the Heart
Natriuretic Peptides: The Hormones of the Heart

Modern cardiovascular science has produced a revolutionary new idea: the heart acts not merely as a pump, but as a "gland", that is as a regulator of circulatory homeostasis and salt-water balance. This book combines the classical heamodynamic view with the new neuro-hormonal paradigm, in all its potential clinical implications. The...

Reasoning with Probabilistic and Deterministic Graphical Models: Exact Algorithms (Synthesis Lectures on Artificial Intelligence and Machine Learning)
Reasoning with Probabilistic and Deterministic Graphical Models: Exact Algorithms (Synthesis Lectures on Artificial Intelligence and Machine Learning)

Graphical models (e.g., Bayesian and constraint networks, influence diagrams, and Markov decision processes) have become a central paradigm for knowledge representation and reasoning in both artificial intelligence and computer science in general. These models are used to perform many reasoning tasks, such as scheduling, planning and...

Operating Systems Design and Implementation (3rd Edition) (Prentice Hall Software Series)
Operating Systems Design and Implementation (3rd Edition) (Prentice Hall Software Series)
The definitive, up-to-date introduction to operating systems:

Core principles plus hands-on examples with the new MINIX 3 operating system

 

The...

A Computational Introduction to Number Theory and Algebra
A Computational Introduction to Number Theory and Algebra
"This is an outstanding and well-written book whose aim is to introduce the reader to a broad range of material -- ranging from basic to relatively advanced -- without requiring any prior knowledge on the part of the reader other than calculus and mathematical maturity. That the book succeeds at this goal is quite an accomplishment! ...this...
Business Processes: Operational Solutions for SAP Implementation
Business Processes: Operational Solutions for SAP Implementation
Business Processes: Operational Solutions for SAP Implementation deals with enterprise resource planning (ERP) systems implementation, and also business operations/processes and information systems to support business operations/processes. There are a large number of books treating ERP implementation, operations management and information systems...
Linux on IBM eserver zSeries and S/390: Best Security Practices
Linux on IBM eserver zSeries and S/390: Best Security Practices
This IBM® Redbook discusses best security practices for running Linux as a z/VM® guest on IBM Eserver® zSeries® and S/390® machines. This publication is intended for system administrators and IT architects responsible for deploying secure Linux servers running under z/VM. We consider both z/VM and Linux security topics.
...
Space Division Multiple Access for Wireless Local Area Networks (Engineering and Computer Science)
Space Division Multiple Access for Wireless Local Area Networks (Engineering and Computer Science)
The tendency towards more mobility and flexibility favors wireless networks for future broadband services, especially in local area and residential networks. Two major challenges in developing such high data-rate wireless networks are the channel distortion caused by multipath propagation and the limitations on bandwidth usage. In this book,...
Principles of Data Mining (Undergraduate Topics in Computer Science)
Principles of Data Mining (Undergraduate Topics in Computer Science)
Data Mining, the automatic extraction of implicit and potentially useful information from data, is increasingly used in commercial, scientific and other application areas.

This book explains and explores the principal techniques of Data Mining: for classification, generation of association rules and clustering. It is written for readers without...

The Mechatronics Handbook (Electrical Engineering Handbook)
The Mechatronics Handbook (Electrical Engineering Handbook)
The Mechatronics Handbook is highly recommended for academic libraries supporting undergraduate or advanced programs in electronics, electrical engineering, computer science, robotics, and related subjects.
-Holly Flynn, Mathematics Librarian, Michigan State University Vernon G. Grove Research Library

…This handbook is a
...
unlimited object storage image
Result Page: 443 442 441 440 439 438 437 436 435 434 433 432 431 430 429 428 427 426 425 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy