Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Supporting People with Dementia Using Pervasive Health Technologies (Advanced Information and Knowledge Processing)
Supporting People with Dementia Using Pervasive Health Technologies (Advanced Information and Knowledge Processing)

Information and communication technologies can provide new paradigms in healthcare provision. In particular, new Pervasive Healthcare technologies can revolutionise the dynamics of healthcare, enabling people to remain at home for longer with lower costs to health and welfare organisations. This book reveals how pervasive healthcare technologies...

Transforming E-business Practices and Applications: Emerging Technologies and Concepts
Transforming E-business Practices and Applications: Emerging Technologies and Concepts

Transforming E-Business Practices and Applications: Emerging Technologies and Concepts presents the latest issues and technologies evolving from business transactions and support. A defining body of research by noted international scholars, this book is an excellent resource for researchers, educators, and professionals and a valuable...

Implementing 802.11, 802.16, and 802.20 Wireless Networks: Planning, Troubleshooting, and Operations
Implementing 802.11, 802.16, and 802.20 Wireless Networks: Planning, Troubleshooting, and Operations

For nearly a century, voice communications networks have been king of the hill. The growth of the Internet in the 1990’s has given rise to the need for data communications networks that are as well developed and flexible as the voice networks that are currently in place. Broadband connectivity has become available in certain places...

Intelligent Multimedia Communication: Techniques and Applications (Studies in Computational Intelligence)
Intelligent Multimedia Communication: Techniques and Applications (Studies in Computational Intelligence)

Multimedia data are used more and more widely in human being's life, e.g., videoconferencing, visual telephone, IPTV, etc. Nearly most of the applications need multimedia transmission techniques that send multimedia data from one side to another side and keep the properties of efficiency, robustness and security. Here, the efficiency...

Software Defined Radio: Architectures, Systems and Functions (Wiley Series in Software Radio)
Software Defined Radio: Architectures, Systems and Functions (Wiley Series in Software Radio)

Software defined radio (SDR) is a hot topic in the telecommunications field, with regard to wireless technology. It is one of the most important topics of research in the area of mobile and personal communications. SDR is viewed as the enabler of global roaming and a platform for the introduction of new technologies and services into existing...

High Definition Cinematography, Third Edition
High Definition Cinematography, Third Edition
High-definition is now ubiquitous in video production and High Definition Cinematography, Third Edition provides the explanations, definitions, and workflows that today's cinematographers and camera operators need to make the transition. Paul Wheeler will explain the high-definition process, suggest the best methods for filming, and help you choose...
Methamphetamine Use: Clinical and Forensic Aspects (Pacific Institute Series on Forensic Psychology)
Methamphetamine Use: Clinical and Forensic Aspects (Pacific Institute Series on Forensic Psychology)

A man is accused of attempted murder of a former crystal meth addict. He claims he shot in self-defense, responding to the extremely aggressive behavior the victim was exhibiting. How will this play out in court? Most likely, the prosecution and the defense will call various expert witnesses - perhaps neurologists, psychologists, pathologists...

Pro Open Source Mail: Building an Enterprise Mail Solution
Pro Open Source Mail: Building an Enterprise Mail Solution

Providing the range of mail-related services expected by organizations can be a confusing, daunting process. Pro Open Source Mail: Building an Enterprise Mail Solution presents a comprehensive guide to managing the most important e-mail services, including user administration, mail transfer agents, remote e-mail access, virus...

Information Quality Management: Theory and Applications
Information Quality Management: Theory and Applications
The current era is associated with widespread and successive waves of technologydriven innovations in information technology (IT). Technologies, such as the Internet, electronic commerce, World Wide Web (WWW), and mobile commerce, bring with them ubiquitous connectivity, real-time access, and overwhelming volumes of data and information. More and...
Handbook of Graph Theory (Discrete Mathematics and Its Applications)
Handbook of Graph Theory (Discrete Mathematics and Its Applications)

The Handbook of Graph Theory is the most comprehensive single-source guide to graph theory ever published. Best-selling authors Jonathan Gross and Jay Yellen assembled an outstanding team of experts to contribute overviews of more than 50 of the most significant topics in graph theory-including those related to algorithmic and optimization...

Reshaping of Dirac Cones in Topological Insulators and Graphene (Springer Theses)
Reshaping of Dirac Cones in Topological Insulators and Graphene (Springer Theses)

Dirac cones are ubiquitous to non-trivial quantum matter and are expected to boost and reshape the field of modern electronics. Particularly relevant examples where these cones arise are topological insulators and graphene. From a fundamental perspective, this thesis proposes schemes towards modifying basic properties of these cones...

Security In Wireless LANS And MANS (Artech House Computer Security)
Security In Wireless LANS And MANS (Artech House Computer Security)
Wireless communications are becoming ubiquitous in homes, offices, and enterprises
with the popular IEEE 802.11 wireless LAN technology and the up-andcoming
IEEE 802.16 wireless MAN technology. The wireless nature of communications
defined in these standards makes it possible for an attacker to snoop on
confidential
...
unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy