Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Adrenergic Receptors in the 21st Century (The Receptors)
The Adrenergic Receptors in the 21st Century (The Receptors)
Our understanding of adrenergic function has advanced considerably in the 15 years since three adrenergic receptor books were published in The Receptors series. In the late 1980s, many of the adrenergic subtypes had not yet been cloned. Most of the studies during that time focused on traditional pharmacological approaches in...
Fiber Optics: Physics and Technology
Fiber Optics: Physics and Technology

Telephone, telefax, email and internet - the key ingredient of the inner workings is the conduit: the line which is designed to carry massive amounts of data at breakneck speed. In their data-carrying capacity optical fiber lines beat other technologies (copper cable, microwave beacons, satellite links) hands down, at least in the long...

Compilation and Synthesis for Embedded Reconfigurable Systems: An Aspect-Oriented Approach
Compilation and Synthesis for Embedded Reconfigurable Systems: An Aspect-Oriented Approach

This book provides techniques to tackle the design challenges raised by the increasing diversity and complexity of emerging, heterogeneous architectures for embedded systems. It describes an approach based on techniques from software engineering called aspect-oriented programming, which allow designers to control today’s sophisticated...

Distributed Antenna Systems: Open Architecture for Future Wireless Communications
Distributed Antenna Systems: Open Architecture for Future Wireless Communications
The rapid growth in mobile communications has led to an increasing demand for wideband high data rate communications services. In recent years, the Distributed Antenna System (DAS) has emerged as a promising candidate beyond 3G and 4G mobile communications. Distributed Antenna Systems: Open Architecture for Future Wireless Communications is a...
Digital Watermarking and Steganography, 2nd Ed. (The Morgan Kaufmann Series in Multimedia Information and Systems)
Digital Watermarking and Steganography, 2nd Ed. (The Morgan Kaufmann Series in Multimedia Information and Systems)
Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties...
Tools for Signal Compression: Applications to Speech and Audio Coding (ISTE)
Tools for Signal Compression: Applications to Speech and Audio Coding (ISTE)
In everyday life, we often come in contact with compressed signals: when using mobile telephones, mp3 players, digital cameras, or DVD players. The signals in each of these applications, telephone-band speech, high fidelity audio signal, and still or video images are not only sampled and quantized to put them into a form suitable for...
Sensors: Theory, Algorithms, and Applications (Springer Optimization and Its Applications)
Sensors: Theory, Algorithms, and Applications (Springer Optimization and Its Applications)
In recent years, technological advances have resulted in the rapid development of a new exciting research direction – the interdisciplinary use of sensors for data collection, systems analysis, and monitoring. Application areas include military surveillance, environmental screening, computational neuroscience,...
Introduction to GPS: The Global Positioning System
Introduction to GPS: The Global Positioning System
If you're looking for an up-to-date, easy-to-understand treatment of the GPS (Global Positioning System), this one-of-a-kind resource offers you the knowledge you need for your work, without bogging you down with advanced mathematics. It addresses all aspects of the GPS, emphasizes GPS applications, examines the GPS signal structure, and covers the...
Biometric User Authentication for IT Security: From Fundamentals to Handwriting (Advances in Information Security)
Biometric User Authentication for IT Security: From Fundamentals to Handwriting (Advances in Information Security)
Biometric user authentication techniques have evoked an enormous interest by science, industry and society in the recent past. Scientists and developers have constantly pursued the technology for automated determination or confirmation of the identity of subjects based on measurements of physiological or behavioral traits of humans. Many biometric...
Embedded Signal Processing with the Micro Signal Architecture
Embedded Signal Processing with the Micro Signal Architecture
Embedded systems are usually part of larger and complex systems and are usually implemented on dedicated hardware with associated software to form a computational engine that will effi ciently perform a specifi c function. The dedicated hardware (or embedded processor) with the associated software is embedded into many...
Satisficing Games and Decision Making: With Applications to Engineering and Computer Science
Satisficing Games and Decision Making: With Applications to Engineering and Computer Science
We constantly make decisions which are simply "good enough" rather than optimal--a type of decision for which Wynn Stirling has adopted the word "satisficing". Most computer decision making algorithms, however, seek only the optimal solution based on rigid criteria and reject others. Outlining an alternative approach, this...
Principles of Embedded Networked Systems Design
Principles of Embedded Networked Systems Design
"...this volume represents a real mine of information...anyone working in the field would benefit from owning a copy." IEEE Communications Engineer

Embedded network systems (ENS) provide a set of technologies that can link the physical world to large-scale networks in applications, such as monitoring of borders,
...
unlimited object storage image
Result Page: 65 64 63 62 61 60 59 58 57 56 55 54 53 52 51 50 49 48 47 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy