Home | Amazing | Today | Tags | Publishers | Years | Search 
Algorithms for Discrete Fourier Transform and Convolution (Signal Processing and Digital Filtering)
Algorithms for Discrete Fourier Transform and Convolution (Signal Processing and Digital Filtering)

The main goal of this graduate-level text is to provide a language for understanding, unifying, and implementing a wide variety of algorithms for digital signal processing -- in particular, to provide rules and procedures that can simplify or even automate the task of writing code for the newest parallel and vector machines. It thus bridges...

Beyond Logos: New Definitions fo Corporate Identity (Graphic Design)
Beyond Logos: New Definitions fo Corporate Identity (Graphic Design)

Corporate identity, the design and marketing buzzphrase of the 80s and 90s, has undergone a revolution in the last five years. Now the talk is of branding. With the growth of globalisation and the increasing realisation among corporations large and small that this is their only way of distinguishing themselves, large sections of the design...

Picture Yourself Learning Microsoft Office 2007
Picture Yourself Learning Microsoft Office 2007

Featured in the four-color, visual Picture Yourself series, Picture Yourself Learning Microsoft Office 2007 is a valuable resource for all readers, beginner to intermediate. Clear, step-by-step instructions walk you through the basics of each application from beginning to end. Helpful tips provide additional information and advice to enhance...

Muhammad Ali: The Making of an Icon (Sporting)
Muhammad Ali: The Making of an Icon (Sporting)

Muhammad Ali (born Cassius Clay) has always engendered an emotional reaction from the public. From his appearance as an Olympic champion to his iconic status as a national hero, his carefully constructed image and controversial persona has always been intensely scrutinized. In Muhammad Ali, Michael Ezra considers the boxer who...

Standard for VHDL Register Transfer Level (Rtl) Synthesis
Standard for VHDL Register Transfer Level (Rtl) Synthesis

[This introduction is not part of IEEE Std 1076.6-1999, IEEE Standard for VHDL Register Transfer Level (RTL) Synthesis.]

This standard describes a syntax and semantics for VHDL RTL synthesis. It defines the subset of IEEE Std 1076-1993 (VHDL) that is suitable for RTL synthesis as well as the semantics of that subset for the...

Congenital Heart Disease in Adults
Congenital Heart Disease in Adults

The adult population with congenital heart disease is increasing rapidly. More than 80% of children with congenital heart disease now reach adulthood, with some congenital heart diseases diagnosed for the first time in adults. The operations performed during childhood may have severe residual findings, which need to be repaired. Cardiologists...

Built by Animals
Built by Animals

From termite mounds and caterpillar cocoons to the elaborate nests of social birds and the deadly traps of spiders, the constructions of the animal world can amaze and at times even rival our own feats of engineering. But how do creatures with such small brains build these complex structures? What drives them to do it?

In this...

The Abs Diet: The Six-Week Plan to Flatten Your Stomach and Keep You Lean for Life
The Abs Diet: The Six-Week Plan to Flatten Your Stomach and Keep You Lean for Life

Great-looking abs are more than just a way to support the mirror industry. In fact, strong abs and flat stomachs are the ultimate indicator of overall health-for both men and women. Great abs will help you live longer, sleep better, prevent back pain, and significantly improve your sex life! (And, hey, they don't look half-bad in the...

Programming Windows Identity Foundation (Dev - Pro)
Programming Windows Identity Foundation (Dev - Pro)

A few years ago, I was sitting at a table playing a game of poker with a few colleagues from Microsoft who had all been involved at various times in the development of Web Services Enhancements for Microsoft .NET (WSE). Don Box, Mark Fussell, Kirill Gavrylyuk, and I played the hands while showman extraordinaire Doug Purdy engaged us with...

Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation
Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation

Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation is designed for system administrators, managers, or Linux users who wish to protect their Linux servers and workstations from unauthorized intrusions and other external threats to their systems' integrity. Written by an experienced hacker--someone...

Fighting Computer Crime: A New Framework for Protecting Information
Fighting Computer Crime: A New Framework for Protecting Information

Who are the cybercriminals and what can we do to stop them? From the #1 cybercrime expert, a revolutionary new approach to . Fighting Computer Crime A top computer crime expert explains why current computer security methods fall dangerously short of the mark and what we can do to fix them. Based on his 30 years as a cybercrime fighter, during...

Fundamental Limitations in Filtering and Control
Fundamental Limitations in Filtering and Control

The issue of fundamental limitations in filtering and control lies at the very heart of any feedback system design, since it reveals what is and is not achievable on the basis of that system's structural and dynamic characteristics. Alongside new succinct treatments of Bode's original results from the 1940s, this book presents a...

Result Page: 876 875 874 873 872 871 870 869 868 867 866 865 864 863 862 861 860 859 858 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy