|
|
|
|
Introduction to Electric Circuits
Praised for its highly accessible, real-world approach, the 6th Edition demonstrates how the analysis and design of electric circuits are inseparably intertwined with the ability of the engineer to design complex electronic, communication, computer, and control systems as well as consumer products. The book offers numerous design problems and... | | Ranking Queries on Uncertain Data (Advances in Database Systems)
Uncertain data is inherent in many important applications, such as environmental surveillance, market analysis, and quantitative economics research. Due to the importance of those applications and rapidly increasing amounts of uncertain data collected and accumulated, analyzing large collections of uncertain data has become an important task.... | | Computer Vision Using Local Binary Patterns (Computational Imaging and Vision)
Humans receive the great majority of information about their environment through
sight, and at least 50% of the human brain is dedicated to vision. Vision is also a key
component for building artificial systems that can perceive and understand their environment.
Computer vision is likely to change society in many ways; for example,
it... |
|
|
Noise Reduction in Speech Processing (Springer Topics in Signal Processing)
Noise is everywhere and in most applications that are related to audio and speech, such as human-machine interfaces, hands-free communications, voice over IP (VoIP), hearing aids, teleconferencing/telepresence/telecollaboration systems, and so many others, the signal of interest (usually speech) that is picked up by a microphone is generally... | | Vision Based Systemsfor UAV Applications (Studies in Computational Intelligence)
This monograph is motivated by a significant number of vision based algorithms for Unmanned Aerial Vehicles (UAV) that were developed during research and development projects. Vision information is utilized in various applications like visual surveillance, aim systems, recognition systems, collision-avoidance systems and navigation. This book... | | Iris Biometric Model for Secured Network Access
In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore, software agents and multi-agent systems (MAS) have shown their efficiency in resolving critical network problems.
Iris Biometric Model for Secured Network Access proposes a... |
|
Time-Dependent Problems and Difference Methods
Praise for the First Edition
". . . fills a considerable gap in the numerical analysis literature by providing a self-contained treatment . . . this is an important work written in a clear style . . . warmly recommended to any graduate student or researcher in the field of the numerical solution of partial... | | Wireless Communications: Algorithmic Techniques
This book introduces the theoretical elements at the basis of various classes of algorithms commonly employed in the physical layer (and, in part, in MAC layer) of wireless communications systems. It focuses on single user systems, so ignoring multiple access techniques. Moreover, emphasis is put on single-input single-output (SISO) systems,... | | Adobe Photoshop CS6 Digital Classroom
A complete training package on the newest version of Photoshop! The Digital Classroom series combines a full-color book with a full-featured DVD, resulting in a complete training package written by expert instructors. Photoshop is the industry standard for image editing, and this guide gets photographers, commercial designers, web developers,... |
|
|
Result Page: 764 763 762 761 760 759 758 757 756 755 754 753 752 751 750 749 748 747 746 |