Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Malicious Attack Propagation and Source Identification (Advances in Information Security)
Malicious Attack Propagation and Source Identification (Advances in Information Security)

This book covers and makes four major contributions:

1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks;

2) proposing a novel approach to identify rumor sources in time-varying networks;

3) developing a fast approach to identify...

Canon EOS Rebel XS/1000D For Dummies (Computer/Tech)
Canon EOS Rebel XS/1000D For Dummies (Computer/Tech)

The new Canon EOS Rebel XS is designed to capture the perfect photos. But if you’re new to SLRs, digital photography can be a bit intimidating. Canon EOS Rebel XS/1000D For Dummies shows you how to get the most out of this digital camera, taking advantage of its 10.1 megapixel CMOS sensor with DIGIC III image processor.

...
Sensor Networks: Where Theory Meets Practice (Signals and Communication Technology)
Sensor Networks: Where Theory Meets Practice (Signals and Communication Technology)

This book collects very recent results in the realm of sensor networking. In particular, it links the theory of sensor networking with practical and implementation aspects. Such, it highlights how sensor networking represents a very interesting research/application area, allowing a researcher to apply his theories and a practitioner to...

Deformable Surface 3D Reconstruction from Monocular Images (Synthesis Lectures on Computer Vision)
Deformable Surface 3D Reconstruction from Monocular Images (Synthesis Lectures on Computer Vision)
Deformable surface 3D reconstruction from monocular images is an active area of research in the Computer Vision community. This encompasses recovering both the shape of thin objects that can be treated as surfaces without perceptible thickness and the visible envelope of fully 3D objects. Whereas this may seem easy for a human...
Computer Vision Metrics: Survey, Taxonomy, and Analysis
Computer Vision Metrics: Survey, Taxonomy, and Analysis

Computer Vision Metrics provides an extensive survey and analysis of over 100 current and historical feature description and machine vision methods, with a detailed taxonomy for local, regional and global features. This book provides necessary background to develop intuition about why interest point detectors and feature descriptors...

Smart Environments: Technology, Protocols and Applications (Wiley Series on Parallel and Distributed Computing)
Smart Environments: Technology, Protocols and Applications (Wiley Series on Parallel and Distributed Computing)
This book is about technologies and standards for smart environments. Smart
environments link computers to everyday settings and commonplace tasks. The
desire to create smart environments has existed for decades, and recent advances
in such areas as pervasive computing, machine learning, and wireless and sensor networking
now
...
Ultra Wideband Wireless Communication
Ultra Wideband Wireless Communication
An international panel of experts provide major research issues and a self-contained, rapid introduction to the theory and application of UWB

This book delivers end-to-end coverage of recent advances in both the theory and practical design of ultra wideband (UWB) communication networks. Contributions offer a worldwide perspective
...
Advances in Control Systems and its Infrastructure: Proceedings of ICPCCI 2019 (Lecture Notes in Electrical Engineering)
Advances in Control Systems and its Infrastructure: Proceedings of ICPCCI 2019 (Lecture Notes in Electrical Engineering)

This book gathers selected research papers presented at the International Conference on Power, Control and Communication Infrastructure 2019 (ICPCCI 2019), organized by the Institute of Infrastructure, Technology, Research and Management (IITRAM), Ahmedabad, Gujarat, India, on July 4–5, 2019. It presents the latest advances,...

Wireless Sensor Networks: Architectures and Protocols
Wireless Sensor Networks: Architectures and Protocols

This book describes how to build wireless sensor networks, from the layers of communication protocols through the design of network nodes. It summarizes the multiple applications of wireless sensor networks, then discusses network device design and the requirements that foster the successful performance of these applications. The book discusses...

Wireless Communications: 2007 CNIT Thyrrenian Symposium (Signals and Communication Technology)
Wireless Communications: 2007 CNIT Thyrrenian Symposium (Signals and Communication Technology)
The 18th Tyrrhenian Workshop on digital communications is devoted to wireless communications. In the last decade, wireless communications research boosted launching new standards and proposing new techniques for the access technology. We moved from the UTRA standard capable to transmit 0.5 bit/s/Hz to WLAN which is promising 2.7 bit/s/Hz. Now...
Building iPhone and iPad Electronic Projects: Real-World Arduino, Sensor, and Bluetooth Low Energy Apps in techBASIC
Building iPhone and iPad Electronic Projects: Real-World Arduino, Sensor, and Bluetooth Low Energy Apps in techBASIC

Why simply play music or go online when you can use your iPhone or iPad for some really fun projects, such as building a metal detector, hacking a radio control truck, or tracking a model rocket in flight? Learn how to build these and other cool things by using iOS device sensors and inexpensive hardware such as Arduino and a...

Intelligent Multimedia Communication: Techniques and Applications (Studies in Computational Intelligence)
Intelligent Multimedia Communication: Techniques and Applications (Studies in Computational Intelligence)

Multimedia data are used more and more widely in human being's life, e.g., videoconferencing, visual telephone, IPTV, etc. Nearly most of the applications need multimedia transmission techniques that send multimedia data from one side to another side and keep the properties of efficiency, robustness and security. Here, the efficiency...

unlimited object storage image
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy