Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Programmable Logic Controllers, Fifth Edition
Programmable Logic Controllers, Fifth Edition

A programmable logic controllers (PLC) is a real-time system optimized for use in severe conditions such as high/low temperatures or an environment with excessive electrical noise. This control technology is designed to have multiple interfaces (I/Os) to connect and control multiple mechatronic devices such as sensors and actuators.
...

Computer Processing of Remotely-Sensed Images: An Introduction
Computer Processing of Remotely-Sensed Images: An Introduction

Remotely-sensed images of the Earth's surface provide a valuable source of information about the geographical distribution and properties of natural and cultural features. This fully revised and updated edition of a highly regarded textbook deals with the mechanics of processing remotely-senses images. Presented in an accessible manner,...

Electro-Optics Handbook
Electro-Optics Handbook

It’s often difficult to predict which areas of a field will become rejuvenated and grow rapidly or spin off to fit with another to form something new. The field of electro-optics is also unpredictable, but currently it has numerous forces acting on it. First is the development of new optical sources such as ultrafast lasers and fiber...

Direct-Write Technologies for Rapid Prototyping Applications: Sensors, Electronics, and Integrated Power Sources
Direct-Write Technologies for Rapid Prototyping Applications: Sensors, Electronics, and Integrated Power Sources

Direct-Write Technologies covers applications, materials, and the techniques in using direct-write technologies. This book provides an overview of the different direct write techniques currently available, as well as a comparison between the strengths and special attributes for each of the techniques. The techniques described open the...

Security for Wireless Ad Hoc Networks
Security for Wireless Ad Hoc Networks
Wireless networks, whether cellular networks or wireless local area networks (LANs), have rapidly become an indispensable part of our life. Evidence of this is the widespread usage of such networks in several areas such as office, home, universities, hot-spots such as airports and hotels etc. In addition, the widespread availability of miniature...
Introduction to Biometrics
Introduction to Biometrics
A number of crucial societal applications like international border crossing, electronic commerce, and welfare disbursement require reliable person recognition systems. Traditional person authentication methods based on passwords and identity documents often fail to meet the stringent security and performance demands of these...
Programming iOS 6
Programming iOS 6

Get a solid grounding in all the fundamentals of Cocoa Touch, and avoid problems during iPhone and iPad app development. With this revised and expanded edition, you’ll dig into Cocoa and learn how to work effectively with Objective-C and Xcode. This book covers iOS 6 in a rigorous, orderly fashion—ideal whether...

Android Hardware Interfacing with the BeagleBone Black
Android Hardware Interfacing with the BeagleBone Black

Design and implement Android apps that interface with your own custom hardware circuits and the BeagleBone Black

About This Book

  • Design custom apps that interact with the outside world via BeagleBone Black
  • Modify Android to recognize, configure, and communicate with sensors, LEDs, memory,...
Program the Internet of Things with Swift for iOS: Learn How to Program Apps for the Internet of Things
Program the Internet of Things with Swift for iOS: Learn How to Program Apps for the Internet of Things

With this book, you will learn how to build apps and hardware for the Internet of Things, using Apple's native APIs and industry standard protocols like Bluetooth and HTTPS. You'll start out learning how to access the sensors on the iPhone, move on to building your own accessories using the Arduino and Raspberry
...
Handbook of Software Quality Assurance
Handbook of Software Quality Assurance
The industry's top guide to software quality -- completely updated!

Practical techniques for mission-critical and commercial software.

Build a great software quality organization.

Prepare for ASQ Software Quality Engineer Certification.

Software quality assurance has never been more challenging -- nor more...

The LEGO MINDSTORMS EV3 Laboratory: Build, Program, and Experiment with Five Wicked Cool Robots
The LEGO MINDSTORMS EV3 Laboratory: Build, Program, and Experiment with Five Wicked Cool Robots

The LEGO® MINDSTORMS® EV3 set offers so many new and exciting features that it can be hard to know where to begin. Without the help of an expert, it could take months of experimentation to learn how to use the advanced mechanisms and numerous programming features.

In The LEGO MINDSTORMS EV3 Laboratory, author
...

Data Mining: A Knowledge Discovery Approach
Data Mining: A Knowledge Discovery Approach
“If you torture the data long enough, Nature will confess,” said 1991 Nobel-winning economist Ronald Coase. The statement is still true. However, achieving this lofty goal is not easy. First, “long enough” may, in practice, be “too long” in many applications and thus unacceptable. Second,...
Result Page: 41 40 39 38 37 36 35 34 33 32 31 30 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy