|
|
|
|
Building a Home Security System with Raspberry Pi
Build your own sophisticated modular home security system using the popular Raspberry Pi board
About This Book
-
This book guides you through building a complete home security system with Raspberry Pi and helps you remotely access it from a mobile device over the Internet
-
It covers the...
| | PIC Basic Projects: 30 Projects using PIC BASIC and PIC BASIC PROMicrocontrollers are single-chip computers consisting of CPU (central processing unit), data and program memory, serial and parallel I/O (input/output), timers, external and internal interrupts, all integrated into a single chip that can be purchased for as little as $2.00. Microcontrollers are intelligent electronic devices used to control and... | | Smart Sensing and Context: Third European Conference, EuroSSC 2008, Zurich, Switzerland
This year marks the third edition of EuroSSC. It builds on the success of the
past editions, held in Enschede, The Netherlands in 2006, and in Kendal, UK in
2007. On behalf of the Organizing Committee, we would like to welcome you to
EuroSSC 2008, in Zurich, Switerland. This volume contains the invited papers
and technical... |
|
Learning iOS Programming: From Xcode to App Store
The arrival of the iPhone changed everything. Or, at the very least, it changed the direction
of software development for mobile platforms, which is a pretty big thing. It has
spawned an entire generation of copycat devices and brought an entire multibilliondollar
industry to its knees. Despite this, it still fits in ... | | Arduino Projects to Save the World
Arduino Projects to Save the World shows that it takes little more than a few tools, a few wires and sensors, an Arduino board, and a bit of gumption to build devices that lower energy bills, help you grow our own food, monitor pollution in the air and in the ground, even warn you about earth tremors.
Arduino... | | |
|
Network Security Through Data Analysis: From Data to Action
Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network traffic datasets. You’ll... | | Computer Vision Beyond the Visible Spectrum (Advances in Pattern Recognition)Recently, there has been a dramatic increase in the use of sensors in the non-visible bands. As a result, there is a need for existing computer vision methods and algorithms to be adapted for use with non-visible sensors, or for the development of completely new methods and systems. Computer Vision Beyond the Visible Spectrum is... | | The Engineering of Complex Real-Time Computer Control SystemsThe complexity of current computer control systems arises from the engineering requirement to integrate computers, actuators and sensors for control, signal processing and data networks, visualisation and display with the technology of the application domain. Further, real-time control systems, employing embedded and distributed computing, as... |
|
|
|
Result Page: 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 |