Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learn Hardware Firmware and Software Design
Learn Hardware Firmware and Software Design
LHFSD is a book unlike any other! It covers the title topics in an incredible manner, and everything WORKS! --Corollary Theorems May, 2005

This book is a Practical Design Project and it contains 3 Parts: 1.Hardware Design guides the reader towards building the LHFSD PCB with a Microchip dsPIC30F4011 microcontroller running
...
Perimeter Security
Perimeter Security
Perimeter Security has taken on a new level of importance since 9/11. Whether insuring the safety of government buildings, hospitals, residences, or bio-research labs, the safety of workers and materials can only be ensured by outfitting all points of entry with the appropriate alarm and surveillance equipment. This comprehensive hands-on resource...
Next Generation Mobile Systems: 3G & Beyond
Next Generation Mobile Systems: 3G & Beyond
What will the future of wireless communications look like?

What drives mobile communications systems beyond 3G?

In Next Generation Mobile Systems the authors answer these questions and others surrounding the new technologies.  The book examines the current research issues...

Mathematics for Computer Graphics
Mathematics for Computer Graphics
Baffled by maths? Then don't give up hope. John Vince will show you how to understand many of the mathematical ideas used in computer animation, virtual reality, CAD, and other areas of computer graphics. In thirteen chapters you will rediscover - and hopefully discover for the first time a new way of understanding - the mathematical techniques...
Topology for Computing (Cambridge Monographs on Applied and Computational Mathematics)
Topology for Computing (Cambridge Monographs on Applied and Computational Mathematics)
Written by a computer scientist for computer scientists, this book teaches topology from a computational point of view, and shows how to solve real problems that have topological aspects involving computers. Such problems arise in many areas, such as computer graphics, robotics, structural biology, and chemistry. The author starts from the basics...
Prime Numbers: The Most Mysterious Figures in Math
Prime Numbers: The Most Mysterious Figures in Math

A fascinating journey into the mind-bending world of prime numbers

Cicadas of the genus Magicicada appear once every 7, 13, or 17 years. Is it just a coincidence that these are all prime numbers? How do twin primes differ from cousin primes, and what on earth (or in the mind of a mathematician) could be sexy about prime numbers?
...

Introduction to Random Signals and Noise
Introduction to Random Signals and Noise

Random signals and noise are present in many engineering systems and networks. Signal processing techniques allow engineers to distinguish between useful signals in audio, video or communication equipment, and interference, which disturbs the desired signal.

With a strong mathematical grounding, this text...

Linux Server Hacks, Volume Two : Tips & Tools for Connecting, Monitoring, and Troubleshooting
Linux Server Hacks, Volume Two : Tips & Tools for Connecting, Monitoring, and Troubleshooting

Today's system administrators deal with a vast number of situations, operating systems, software packages, and problems. Those who are in the know have kept their copy of Linux Server Hacks close at hand to ease their burden. And while this helps, it's not enough: any sys admin knows there are...

Computer Viruses: from theory to applications (Collection IRIS)
Computer Viruses: from theory to applications (Collection IRIS)
This book deals with computer viruses envisaged from three different points of view, namely the theoretical fundamentals of computer virology, algorithmic and practical aspects of viruses and their potential applications to various areas. The theoretical formalization by means of Turing machines, self-reproducing automata and recursive functions...
Multi-Sensor Image Fusion and Its Applications (Signal Processing and Communica)
Multi-Sensor Image Fusion and Its Applications (Signal Processing and Communica)
Imaging sensors are an important resource in today’s world. Further, a single sensor cannot provide a complete view of the environment in many applications. Just as humans use all five senses to great advantage, computers use image fusion algorithms to gain similar advantages. The resulting fused image, if suitably obtained from a set of...
Hardening Windows, Second Edition
Hardening Windows, Second Edition

Hardening is the process of protecting a system against unknown threats. System administrators harden against that which they think could be a threat. Administrators know the Internet is a hostile environment. Although they can't tell, for example, that a hacker will attempt to gain access to the SQL server next Tuesday, they can bet...

Maxillofacial Imaging
Maxillofacial Imaging

Maxillofacial imaging has evolved dramatically over the past two decades with development of new cross-sectional imaging techniques. Traditional maxillofacial imaging was based on plain films and dental imaging. However, today’s advanced imaging techniques with CT and MRI have only been partially implemented for maxillofacial questions....

Result Page: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Next 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy