LHFSD is a book unlike any other! It covers the title topics in an incredible manner, and everything WORKS! --Corollary Theorems May, 2005

This book is a Practical Design Project and it contains 3 Parts: 1.Hardware Design guides the reader towards building the LHFSD PCB with a Microchip dsPIC30F4011 microcontroller running...

Perimeter Security has taken on a new level of importance since 9/11. Whether insuring the safety of government buildings, hospitals, residences, or bio-research labs, the safety of workers and materials can only be ensured by outfitting all points of entry with the appropriate alarm and surveillance equipment. This comprehensive hands-on resource...

What will the future of wireless communications look like?

What drives mobile communications systems beyond 3G?

In Next Generation Mobile Systems the authors answer these questions and others surrounding the new technologies. The book examines the current research issues...

Baffled by maths? Then don't give up hope. John Vince will show you how to understand many of the mathematical ideas used in computer animation, virtual reality, CAD, and other areas of computer graphics. In thirteen chapters you will rediscover - and hopefully discover for the first time a new way of understanding - the mathematical techniques...

Written by a computer scientist for computer scientists, this book teaches topology from a computational point of view, and shows how to solve real problems that have topological aspects involving computers. Such problems arise in many areas, such as computer graphics, robotics, structural biology, and chemistry. The author starts from the basics...

A fascinating journey into the mind-bending world of prime numbers

Cicadas of the genus Magicicada appear once every 7, 13, or 17 years. Is it just a coincidence that these are all prime numbers? How do twin primes differ from cousin primes, and what on earth (or in the mind of a mathematician) could be sexy about prime numbers?...

Random signals and noise are present in many engineering systems and networks. Signal processing techniques allow engineers to distinguish between useful signals in audio, video or communication equipment, and interference, which disturbs the desired signal.

With a strong mathematical grounding, this text...

Today's system administrators deal with a vast number of situations, operating systems, software packages, and problems. Those who are in the know have kept their copy of Linux Server Hacks close at hand to ease their burden. And while this helps, it's not enough: any sys admin knows there are...

This book deals with computer viruses envisaged from three different points of view, namely the theoretical fundamentals of computer virology, algorithmic and practical aspects of viruses and their potential applications to various areas. The theoretical formalization by means of Turing machines, self-reproducing automata and recursive functions...

Imaging sensors are an important resource in today’s world. Further, a single sensor cannot provide a complete view of the environment in many applications. Just as humans use all five senses to great advantage, computers use image fusion algorithms to gain similar advantages. The resulting fused image, if suitably obtained from a set of...

Hardening is the process of protecting a system against unknown threats. System administrators harden against that which they think could be a threat. Administrators know the Internet is a hostile environment. Although they can't tell, for example, that a hacker will attempt to gain access to the SQL server next Tuesday, they can bet...

Maxillofacial imaging has evolved dramatically over the past two decades with development of new cross-sectional imaging techniques. Traditional maxillofacial imaging was based on plain films and dental imaging. However, today’s advanced imaging techniques with CT and MRI have only been partially implemented for maxillofacial questions....