Home | Amazing | Today | Tags | Publishers | Years | Search 
CMMI Distilled: A Practical Introduction to Integrated Process Improvement (3rd Edition) (The SEI Series in Software Engineering)
CMMI Distilled: A Practical Introduction to Integrated Process Improvement (3rd Edition) (The SEI Series in Software Engineering)
CMMI® (Capability Maturity Model® Integration) is an integrated, extensible framework for improving process capability and quality across an organization. It has become a cornerstone in the implementation of continuous improvement for both industry and governments around the world. Rich in both detail and guidance for a wide set of...
Essentials of Radio Wave Propagation (The Cambridge Wireless Essentials Series)
Essentials of Radio Wave Propagation (The Cambridge Wireless Essentials Series)
If you need to maximize efficiency in wireless network planning, this quick reference guide to an increasingly complex and difficult topic is for you. Using real-world case studies, practical problems and minimum mathematics, the author explains simply and clearly how to predict signal strengths in a variety of situations. More sophisticated...
RFID Explained (Synthesis Lectures on Mobile and Pervasive Computing)
RFID Explained (Synthesis Lectures on Mobile and Pervasive Computing)
This lecture provides an introduction to Radio Frequency Identification (RFID), a technology enabling automatic identification of objects at a distance without requiring line-of-sight. Electronic tagging can be divided into technologies that have a power source (active tags), and those that are powered by the tag interrogation signal (passive...
Genetic and Evolutionary Computation for Image Processing and Analysis (EURASIP Book Series on Signal Processing and Communications)
Genetic and Evolutionary Computation for Image Processing and Analysis (EURASIP Book Series on Signal Processing and Communications)
Image analysis and processing is steadily gaining relevance within the large number of application fields to which genetic and evolutionary computation (GEC) techniques are applied. Although more and more examples of such applications can be found in literature, they are scattered, apart from a few exceptions, in proceedings and journals dedicated...
Pattern Recognition, Third Edition
Pattern Recognition, Third Edition
A classic -- offering comprehensive and unified coverage with a balance between theory and practice!

Pattern recognition is integral to a wide spectrum of scientific disciplines and technologies including image analysis, speech recognition and audio classification, communications, computer-aided diagnosis, data mining. The authors,
...
Machine Vision : Theory, Algorithms, Practicalities
Machine Vision : Theory, Algorithms, Practicalities
In the last 40 years, machine vision has evolved into a mature field embracing a wide range of applications including surveillance, automated inspection, robot assembly, vehicle guidance, traffic monitoring and control, signature verification, biometric measurement, and analysis of remotely sensed images. While researchers and industry specialists...
The Designer's Guide to SPICE and Spectre® (The Designer's Guide Book Series)
The Designer's Guide to SPICE and Spectre® (The Designer's Guide Book Series)
The Designer's Guide to SPICE and Spectre® is an in-depth guide to circuit simulators from a designer's perspective: the pitfalls of circuit simulation, such as convergence and accuracy problems, are explained in terms a circuit designer is comfortable with. The book gives designers insight into why these problems occur and how to...
Networks on Chips: Technology and Tools (Systems on Silicon)
Networks on Chips: Technology and Tools (Systems on Silicon)
The exponentially increasing complexity and heterogeneity of future SoCs forces the designer to abandon traditional bus -based structures and to implement innovative networks-on-chip. This book, written by two leading researchers, is the first of its kind. It is a must on the bookshelf of anybody having an interest in SoC design Heinrich Meyr,...
Fundamentals of Complex Analysis  with Applications to Engineering,  Science, and Mathematics (3rd Edition)
Fundamentals of Complex Analysis with Applications to Engineering, Science, and Mathematics (3rd Edition)
This book provides a comprehensive introduction to complex variable theory and its applications to current engineering problems and is designed to make the fundamentals of the subject more easily accessible to readers who have little inclination to wade through the rigors of the axiomatic approach. Modeled after standard calculus books--both in...
The Practice Of Crime Scene Investigation (Taylor & Francis Forensic Science Series)
The Practice Of Crime Scene Investigation (Taylor & Francis Forensic Science Series)
The authors have included a rather unique review of associative evidence and the Locard exchange principle. The contributors to this text are clearly well-qualified and the resultant stand-alone chapters allow the reader to pick and choose the topics of interest. [A] readable text with relevant content for the forensic specialist.
- Journal:
...
Analysis and Control of Nonlinear Process Systems (Advanced Textbooks in Control and Signal Processing)
Analysis and Control of Nonlinear Process Systems (Advanced Textbooks in Control and Signal Processing)
Almost all process systems are nonlinear in nature. Nonlinear control is traditionally an area of interest in process systems engineering which is of great practical importance. These facts notwithstanding, many process engineers have difficulty with the paradigms and results of modern nonlinear control theory because they lack the mathematical...
Digital Watermarking and Steganography, 2nd Ed. (The Morgan Kaufmann Series in Multimedia Information and Systems)
Digital Watermarking and Steganography, 2nd Ed. (The Morgan Kaufmann Series in Multimedia Information and Systems)
Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties...
Result Page: 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy