Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Turbopumps and Pumping Systems
Turbopumps and Pumping Systems

This book covers most of the subjects that are requested by engineers, those who are directly involved in design and manufacturing the pumps to those who operate the pumps in industrial units. The authors have worked for many years teaching the subject, conducting research, and implementing pump and pump station designs in different academic...

Inductive Learning Algorithms for Complex System Modeling
Inductive Learning Algorithms for Complex System Modeling
Inductive Learning Algorithms for Complex Systems Modeling is a professional monograph that surveys new types of learning algorithms for modeling complex scientific systems in science and engineering. The book features discussions of algorithm development, structure, and behavior; comprehensive coverage of all types of algorithms useful for this...
Domain Driven Data Mining
Domain Driven Data Mining

In the present thriving global economy a need has evolved for complex data analysis to enhance an organization’s production systems, decision-making tactics, and performance. In turn, data mining has emerged as one of the most active areas in information technologies. Domain Driven Data Mining offers state-of the-art research and...

The Design of CMOS Radio-Frequency Integrated Circuits, Second Edition
The Design of CMOS Radio-Frequency Integrated Circuits, Second Edition

This expanded and thoroughly revised edition of Thomas H. Lee's acclaimed guide to the design of gigahertz RF integrated circuits features a completely new chapter on the principles of wireless systems. The chapters on low-noise amplifiers, oscillators and phase noise have been significantly expanded as well. The chapter on architectures...

Fighting Computer Crime: A New Framework for Protecting Information
Fighting Computer Crime: A New Framework for Protecting Information

Who are the cybercriminals and what can we do to stop them? From the #1 cybercrime expert, a revolutionary new approach to . Fighting Computer Crime A top computer crime expert explains why current computer security methods fall dangerously short of the mark and what we can do to fix them. Based on his 30 years as a cybercrime fighter, during...

Pragmatic Guide to Subversion (Pragmatic Guides)
Pragmatic Guide to Subversion (Pragmatic Guides)

Subversion sets the standard in version control systems. Championed by open-source developers, Subversion is behind some of today's biggest and most important software, including Apache, FreeBSD, Ruby, and MediaWiki. But more than just a tool for open-source collaboration, Subversion has made a significant impact in the corporate...

Artificial Intelligence: Structures and Strategies for Complex Problem Solving (6th Edition)
Artificial Intelligence: Structures and Strategies for Complex Problem Solving (6th Edition)

was very pleased to be asked to produce the sixth edition of my artificial intelligence book. It is a compliment to the earlier editions, started over twenty years ago, that our approach to AI has been so highly valued. It is also exciting that, as new development in the field emerges, we are able to present much of it in each new...

UMTS Network Planning, Optimization, and Inter-Operation with GSM
UMTS Network Planning, Optimization, and Inter-Operation with GSM

The continuing explosive growth in mobile communication is demanding more spectrally efficient radio access technologies than the prevalent second generation (2G) systems such as GSM to handle just the voice traffic. We are already witnessing high levels of mobile penetration exceeding 70% in some countries. It is anticipated that by...

Location-Based Information Systems: Developing Real-Time Tracking Applications
Location-Based Information Systems: Developing Real-Time Tracking Applications

Location-based services (LBS) are nally coming out of research labs and getting into the hands of nal users. It is fairly common to see cellular carriers and private companies o ering LBS to locate your children, friends, and sites of interest, track assets, enhance the security of key personnel, help people with disabilities use...

Security in Computing Systems: Challenges, Approaches and Solutions
Security in Computing Systems: Challenges, Approaches and Solutions

This monograph on Security in Computing Systems: Challenges, Approaches and Solutions aims at introducing, surveying and assessing the fundamentals of secu rity with respect to computing. Here, “computing” refers to all activities which individuals or groups directly or indirectly perform by means of computing sys tems,...

Text, Speech and Dialogue: 13th International Conference, TSD 2010, Brno, Czech Republic, September 6-10
Text, Speech and Dialogue: 13th International Conference, TSD 2010, Brno, Czech Republic, September 6-10
The annual Text, Speech and Dialogue Conference (TSD), which originated in 1998, is now starting its second decade. So far more than 1,000 authors from 45 countries have contributed to the proceedings. TSD constitutes a recognized platform for the presentation and discussion of state-of-the-art technology and recent achievements in...
Introduction to the Theory of Programming Languages (Undergraduate Topics in Computer Science)
Introduction to the Theory of Programming Languages (Undergraduate Topics in Computer Science)
The ultimate, definitive programming language has not been created yet, far from it. Almost every day a new language is created, and new functionalities are added to existing languages. Improvements in programming languages contribute to making programs more reliable, shorten the development time, and make programs easier to...
unlimited object storage image
Result Page: 771 770 769 768 767 766 765 764 763 762 761 760 759 758 757 756 755 754 753 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy