Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
GIScience Teaching and Learning Perspectives (Advances in Geographic Information Science)
GIScience Teaching and Learning Perspectives (Advances in Geographic Information Science)
This volume uniquely links educational theories and the practice of GIScience in higher education contexts to guide classroom practice, present effective practical implementations from peers, and provide resources and strategies for effective teaching methods. The book offers a comprehensive exploration of GIScience education, including...
Compact Slot Array Antennas for Wireless Communications (Signals and Communication Technology)
Compact Slot Array Antennas for Wireless Communications (Signals and Communication Technology)
This book describes and provides design guidelines for antennas that achieve compactness by using the slot radiator as the fundamental building block within a periodic array, rather than a phased array. It provides the basic electromagnetic tools required to design and analyse these novel antennas, with sample calculations...
Crowdfunding in China: A New Institutional Economics Approach (Contributions to Management Science)
Crowdfunding in China: A New Institutional Economics Approach (Contributions to Management Science)

China is currently the front-runner on the global crowdfunding market, even though this form of financing originated in the USA. Crowdfunding in China, however, differs significantly from its counterpart in the West. This book reveals that Chinese crowdfunding is a product of the country’s dynamic internet sector, which is...

Wireless Communication Electronics: Introduction to RF Circuits and Design Techniques
Wireless Communication Electronics: Introduction to RF Circuits and Design Techniques

This book is intended for senior undergraduate and graduate students as well as practicing engineers who are involved in design and analysis of radio frequency (RF) circuits.  Detailed tutorials are included on all major topics required to understand fundamental principles behind both the main sub-circuits required to design an...

Wireless Networks: Multiuser Detection in Cross-Layer Design (Information Technology: Transmission, Processing and Storage)
Wireless Networks: Multiuser Detection in Cross-Layer Design (Information Technology: Transmission, Processing and Storage)
Cross-layer design seeks to enhance the capacity of wireless networks significantly through the joint optimization of multiple layers in the network, primarily the physical (PHY) and medium access control (MAC) layers. Although there are advantages of such design in wireline networks as well, this approach is particularly advantageous for wireless...
Wavelet Image and Video Compression (The Springer International Series in Engineering and Computer Science)
Wavelet Image and Video Compression (The Springer International Series in Engineering and Computer Science)
`This is a very well-organized and useful reference book for those who are new to wavelet image and video coding.'
Journal of Electronic Imaging, 9:2 (2000)

An exciting new development has taken place in the digital era that has captured the imagination and talent of
...
SystemVerilog for Verification, Second Edition: A Guide to Learning the Testbench Language Features
SystemVerilog for Verification, Second Edition: A Guide to Learning the Testbench Language Features
SystemVerilog for Verification, Second Edition provides practical information for hardware and software engineers using the SystemVerilog language to verify electronic designs. The author explains methodology concepts for constructing testbenches that are modular and reusable. The book includes extensive coverage of the SystemVerilog 3.1a...
Forensics in Telecommunications, Information and Multimedia: Second International Conference, e-Forensics 2009
Forensics in Telecommunications, Information and Multimedia: Second International Conference, e-Forensics 2009
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Forensics in Telecommunications, Information and Multimendia, e-Forensics 2009, held in Adelaide, Australia, in January 2009.

The focus of this year's conference has shifted to the legal rather than the deeply technical especially...

Fundamentals of Thermodynamics and Applications: With Historical Annotations and Many Citations from Avogadro to Zermelo
Fundamentals of Thermodynamics and Applications: With Historical Annotations and Many Citations from Avogadro to Zermelo

The book provides a systematic introduction into the fundamental ideas of thermodynamics at a somewhat advanced level. And it exhibits many applications of the theory in the fields of engineering, physics, chemistry, physical chemistry, and materials science. The universal equations of balance are strictly separated from the constitutive...

Discrete, Continuous, and Hybrid Petri Nets
Discrete, Continuous, and Hybrid Petri Nets

Petri Nets were introduced and still successfully used to analyze and model discrete event systems especially in engineering and computer sciences such as in automatic control.

Recently this discrete Petri Nets formalism was successfully extended to continuous and hybrid systems. This monograph presents a well written and clearly...

Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011
Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011

These are the proceedings of TCC 2011, the 8th Theory of Cryptography Conference, which was held in Brown University, Providence, RI, during March 28–30, 2011. The conference was sponsored by the International Association for Cryptologic Research (IACR). The General Chair was Anna Lysyanskaya.

The Program Committee,...

Towards Dynamic Randomized Algorithms in Computational Geometry (Lecture Notes in Computer Science)
Towards Dynamic Randomized Algorithms in Computational Geometry (Lecture Notes in Computer Science)

Computational geometry concerns itself with designing and analyzing algorithms for solving geometric problems. The field has reached a high level of sophistication, and very complicated algorithms have been designed. However, it is also useful to develop more practical algorithms, so long as they are based on rigorous methods. One such method...

unlimited object storage image
Result Page: 434 433 432 431 430 429 428 427 426 425 424 423 422 421 420 419 418 417 416 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy