Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
ESD : RF Technology and Circuits
ESD : RF Technology and Circuits
The phenomenon of electrostatic discharge (ESD) has been known for a long time, but recently a growing interest has been observed in ESD in radio frequency (RF) technology and ESD issues in RF applications.

Why now?

Early telecommunications started with William Cooke and Charles Wheatstone in the development of the electric
...
Mathematical Objects in C++: Computational Tools in A Unified Object-Oriented Approach
Mathematical Objects in C++: Computational Tools in A Unified Object-Oriented Approach
This is an exciting book on mathematics on one hand and computer programming on the other, and the reader can concentrate on one of the topics or both. The mathematics part focuses on teaching mathematics through constructive algorithms, ready for computer implementation. I believe this is the future view of these classical mathematical subjects....
MasterCases in Hand and Wrist Surgery
MasterCases in Hand and Wrist Surgery

Textbook surgical education usually follows a predictable format involving fairly in-depth descriptions of various pathologic conditions including etiology, pathophysiology, symptomatology, diagnostic procedures, conservative management, and surgical treatment. Although there is variation in the emphasis different books place on each...

Thermodynamics And Heat Powered Cycles: A Cognitive Engineering Approach
Thermodynamics And Heat Powered Cycles: A Cognitive Engineering Approach
Due to the rapid advances in computer technology, intelligent computer software and multimedia have become essential parts of engineering education. Software integration with various media such as graphics, sound, video and animation is providing efficient tools for teaching and learning. A modern textbook should contain both the...
Laws of Small Numbers: Extremes and Rare Events
Laws of Small Numbers: Extremes and Rare Events

Since the publication of the first edition of this seminar book in 1994, the theory and applications of extremes and rare events have enjoyed an enormous and still increasing interest. The intention of the book is to give a mathematically oriented development of the theory of rare events underlying various applications. This characteristic of...

Textbook of Neurointensive Care
Textbook of Neurointensive Care

This updated and refined new edition is the only book to provide a comprehensive approach to the intensive care of neurologically injured patients from the emergency room and ICU through the operating room and post-surgical period. It reviews neuroanatomy, neuroradiology, and neurophysiology, examines the neurological problems most frequently...

Cryptography: Theory and Practice, Third Edition (Discrete Mathematics and Its Applications)
Cryptography: Theory and Practice, Third Edition (Discrete Mathematics and Its Applications)

The first edition of this book, which was published in 1995, contained thirteen chapters. My objective was to produce a general textbook that treated all the essential core areas of cryptography, as well as a selection of more advanced topics. In writing the book, I tried to design it to be flexible enough to permit a wide variety of...

Explaining Algorithms Using Metaphors (SpringerBriefs in Computer Science)
Explaining Algorithms Using Metaphors (SpringerBriefs in Computer Science)

There is a significant difference between designing a new algorithm, proving its correctness, and teaching it to an audience. When teaching algorithms, the teacher's main goal should be to convey the underlying ideas and to help the students form correct mental models related to the algorithm. This process can often be facilitated by...

Real-Time Object Uniform Design Methodology with UML
Real-Time Object Uniform Design Methodology with UML
The competitiveness of organizations facing globalization, information and communication technologies relies on strategic issues such as reuse of knowledge from past experiences to make higher quality decisions, deployment of innovative, fast methodological approaches for solving problems and building systems. Real-life systems are often...
Microprocessors: From Assembly Language to C Using the PICI8FXX2 (Electrical and Computer Engineering Series)
Microprocessors: From Assembly Language to C Using the PICI8FXX2 (Electrical and Computer Engineering Series)
This book is designed for a first course in microprocessors or it may be used as a reference for practicing engineers. The book is unique in presenting a balanced, integrated topic coverage of assembly language programming, microcontroller programming via the C language, and hardware interfacing. Programming topics are discussed using both assembly...
Mechanics: From Newton's Laws to Deterministic Chaos
Mechanics: From Newton's Laws to Deterministic Chaos

This book covers all topics in mechanics from elementary Newtonian mechanics, the principles of canonical mechanics and rigid body mechanics to relativistic mechanics and nonlinear dynamics. It was among the first textbooks to include dynamical systems and deterministic chaos in due detail. As compared to the previous editions the present...

Elements of Computer Security (Undergraduate Topics in Computer Science)
Elements of Computer Security (Undergraduate Topics in Computer Science)

As our society grows ever more reliant on computers, so it also becomes more vulnerable to computer crime. Cyber attacks have been plaguing computer users since the 1980s, and computer security experts are predicting that smart telephones and other mobile devices will also become the targets of cyber security threats in the future.

...

unlimited object storage image
Result Page: 80 79 78 77 76 75 74 73 72 71 70 69 68 67 66 65 64 63 62 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy