Home | Amazing | Today | Tags | Publishers | Years | Search 
Communications Network Test & Measurement Handbook
Communications Network Test & Measurement Handbook

As digital communications networks grow in use and size throughout the world, the need for accurate, reliable test and measurement procedures has increased tremendously. This unique handbook provides the only comprehensive coverage of all the methodologies, data, and reference material necessary to master network instrumentation. In this...

Microwave Circuits for 24 GHz Automotive Radar in Silicon-based Technologies
Microwave Circuits for 24 GHz Automotive Radar in Silicon-based Technologies

There are continuous efforts focussed on improving road traffic safety worldwide. Numerous vehicle safety features such as driver assistance systems have been invented. Many driver assistance features rely on radar-based sensors, but are highly-priced. Realization of low-cost radar front-end circuits would enable their implementation in less...

The Gale Encyclopedia of Children's Health: Infancy Through Adolescence
The Gale Encyclopedia of Children's Health: Infancy Through Adolescence

The safety of children is potentially at risk from accidents and injuries, as well as crime. Providing a safe environment, putting prevention measures into practice, and teaching children methods of self-protection are all ways to reduce the potential for harm to children.

Description

Accidents are the leading cause of...

Numerical Solution of Partial Differential Equations on Parallel Computers
Numerical Solution of Partial Differential Equations on Parallel Computers

Since the dawn of computing, the quest for a better understanding of Nature has been a driving force for technological development. Groundbreaking achievements by great scientists have paved the way from the abacus to the supercomputing power of today. When trying to replicate Nature in the computer’s silicon test tube, there is need...

Principles of Constraint Programming
Principles of Constraint Programming

This book is about constraint programming, an alternative approach to programming which relies on a combination of techniques that deal with reasoning and computing. It has been successfully applied in a number of fields including molecular biology, electrical engineering, operations research and numerical analysis. The central notion is that...

The BMW 5 Series and X5: A History of Production Cars and Tuner Specials, 1972-2008
The BMW 5 Series and X5: A History of Production Cars and Tuner Specials, 1972-2008

In the late 1960s racer and businessman Gordon Spice familiarized himself with the Nürburgring using a rented BMW 2002. He went through a couple of sets of tires and three sets of brake pads during the exercise and covered the cost of such consumables by charging folks to ride with him! The rental company was somewhat puzzled by the fact...

Computer Vision - ACCV 2010: 10th Asian Conference on Computer Vision, Queenstown, New Zealand
Computer Vision - ACCV 2010: 10th Asian Conference on Computer Vision, Queenstown, New Zealand

The 2010 Asian Conference on Computer Vision took place in the southern hemisphere, in “The Land of the Long White Cloud” in Maori language, also known as New Zealand, in the beautiful town of Queenstown. If we try to segment the world we realize that New Zealand does not belong officially to any continent. Similarly, in computer...

Geographic Data Mining and Knowledge Discovery, Second Edition
Geographic Data Mining and Knowledge Discovery, Second Edition

Similar to many research and application fields, geography has moved from a datapoor and computation-poor to a data-rich and computation-rich environment. The scope, coverage, and volume of digital geographic datasets are growing rapidly. Public and private sector agencies are creating, processing, and disseminating digital data on land use,...

Computer Facial Animation
Computer Facial Animation

This book is about computer facial models, computer-generated facial images, and facial animation. In particular, it addresses the principles of creating face models and the manipulation or control of computer-generated facial attributes. In addition, various sections in the book describe and explain the development of specific computer...

Software Modeling and Design: UML, Use Cases, Patterns, and Software Architectures
Software Modeling and Design: UML, Use Cases, Patterns, and Software Architectures

This book describes a use case–driven UML-based method for the modeling and design of software architectures, including object-oriented software architectures, client/server software architectures, service-oriented architectures, componentbased software architectures, concurrent and real-time software architectures, and software...

An Implementation Guide to Compiler Writing
An Implementation Guide to Compiler Writing

An important aspect of teaching a course in compiler writing is to illustrate the key theoretical concepts normally taught in such a course. A frequently used strategy for achieving this goal is to have a student design a simple programming language and implement a compiler for this language. Many texts in compiler writing do not,...

Managing Web Usage in the Workplace: A Social, Ethical, and Legal Perspective
Managing Web Usage in the Workplace: A Social, Ethical, and Legal Perspective

The ubiquitous nature of the Internet is dramatically revolutionizing the manner in which organizations and individuals share information. Developed out of necessity during the cold war, the Internet was created as a means to help governmental institutions and collegiate institutions send documents and research materials electronically...

Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy