Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Passive, Active, and Digital Filters (The Circuits and Filters Handbook)
Passive, Active, and Digital Filters (The Circuits and Filters Handbook)

Culled from the pages of CRC's highly successful, best-selling The Circuits and Filters Handbook, Second Edition, Passive, Active, and Digital Filters presents a sharply focused, comprehensive review of the fundamental theory behind professional applications of these complex filters. It supplies a concise, convenient reference to the key...

Computational Prospects Of Infinity - Part I: Tutorials (Lecture Notes)
Computational Prospects Of Infinity - Part I: Tutorials (Lecture Notes)
This volume presents the written versions of the tutorial lectures given at the Workshop on Computational Prospects of Infinity, held from 18 June to 15 August 2005 at the Institute for Mathematical Sciences, National University of Singapore. It consists of articles by four of the leading experts in recursion theory (computability theory) and set...
A New Perspective on Thermodynamics
A New Perspective on Thermodynamics

The book adheres to a chronological development of the laws of thermodynamics as the inventors of those laws discovered them. This shows that "new" discoveries of non-optimal efficiencies are not new at all and have been analyzed by people like Lord Kelvin as far back as 1852 in his analysis of an unevenly heated body.

...
Handbook of Data Compression
Handbook of Data Compression

Data compression is one of the most important fields and tools in modern computing. From archiving data, to CD-ROMs, and from coding theory to image analysis, many facets of modern computing rely upon data compression. This book provides a comprehensive reference for the many different types and methods of compression. Included are a detailed...

Cisco Firewalls (Networking Technology: Security)
Cisco Firewalls (Networking Technology: Security)

Networks today have outgrown exponentially both in size and complexity, becoming more multifaceted and increasingly challenging to secure. The blueprint of a core network requires a strong foundation, which can be simply provided with an integrated firewall architecture cemented at the core of the system. Today, the firewall has become...

Adaptive Control Approach for Software Quality Improvement (Series on Software Engineering & Knowledge Engineering)
Adaptive Control Approach for Software Quality Improvement (Series on Software Engineering & Knowledge Engineering)
The expansion of our reliance on software in many aspects of modern society has coincided with a number of incidents in aeronautics, astronautics, transportation, medical devices, energy generation, banking and finance. Failures caused by software have introduced more than just inconvenience, but significant property damage,...
Digital Fundamentals (8th Edition)
Digital Fundamentals (8th Edition)

For mid-level courses in Digital Electronics, Digital Logic, Computer Fundamentals, and Digital Fundamentals.Reflecting combined experience in the engineering industry and in the classroom, this bestseller provides thorough, up-to-date coverage of digital fundamentals--from basic concepts to microprocessors, programmable logic, and digital...

Approximation Methods for Polynomial Optimization: Models, Algorithms, and Applications (SpringerBriefs in Optimization)
Approximation Methods for Polynomial Optimization: Models, Algorithms, and Applications (SpringerBriefs in Optimization)
Polynomial optimization, as its name suggests, is used to optimize a generic multivariate polynomial function, subject to some suitable polynomial equality and/or inequality constraints. Such problem formulation dates back to the nineteenth century when the relationship between nonnegative polynomials and sum of squares (SOS) was...
Battery Systems Engineering
Battery Systems Engineering

A complete all-in-one reference on the important interdisciplinary topic of Battery Systems Engineering

Focusing on the interdisciplinary area of battery systems engineering, this book provides the background, models, solution techniques, and systems theory that are necessary for the development of advanced battery management...

Neural Network Programming with Java
Neural Network Programming with Java

Create and unleash the power of neural networks by implementing professional Java code

About This Book

  • Learn to build amazing projects using neural networks including forecasting the weather and pattern recognition
  • Explore the Java multi-platform feature to run your personal neural...
Queer Embodiment: Monstrosity, Medical Violence, and Intersex Experience (Expanding Frontiers: Interdisciplinary Approaches to Studies of Women, Gender, and Sexuality)
Queer Embodiment: Monstrosity, Medical Violence, and Intersex Experience (Expanding Frontiers: Interdisciplinary Approaches to Studies of Women, Gender, and Sexuality)
Merging critical theory, autobiography, and sexological archival research, Queer Embodiment provides insight into what it means, and has meant, to have a legible body in the West. Hilary Malatino explores how and why intersexuality became an anomalous embodiment requiring correction and how contesting this pathologization...
Algorithms: Design and Analysis (De Gruyter Textbook)
Algorithms: Design and Analysis (De Gruyter Textbook)

Algorithms play a central role both in the theory and in the practice of computing. The goal of the authors was to write a textbook that would not trivialize the subject but would still be readable by most students on their own. The book contains over 120 exercises. Some of them are drills; others make important points about the...

unlimited object storage image
Result Page: 316 315 314 313 312 311 310 309 308 307 306 305 304 303 302 301 300 299 298 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy