Home | Amazing | Today | Tags | Publishers | Years | Search 
Nutrigenomics and Nutrigenetics in Functional Foods and Personalized Nutrition
Nutrigenomics and Nutrigenetics in Functional Foods and Personalized Nutrition

While functional foods have become a reasonably well-established concept, personalized nutrition is still treated with skepticism by many. The recognition that people would have different nutrient requirements, or perceive foods in different ways, raises several concerns―some real, some not so real. Nutrigenomics and...

Security and Privacy in Smart Grids
Security and Privacy in Smart Grids

Presenting the work of prominent researchers working on smart grids and related fields around the world, Security and Privacy in Smart Grids identifies state-of-the-art approaches and novel technologies for smart grid communication and security. It investigates the fundamental aspects and applications of smart grid security...

Electrical Machines with MATLAB®
Electrical Machines with MATLAB®

Electrical Machines with MATLAB® encapsulates the invaluable insight and experience that eminent instructor Turan Gönen has acquired in almost 40 years of teaching. With simple, versatile content that separates it from other texts on electrical machines, this book is an ideal self-study tool for advanced...

Management of Hazardous Energy: Deactivation, De-Energization, Isolation, and Lockout
Management of Hazardous Energy: Deactivation, De-Energization, Isolation, and Lockout

Hazardous energy present in systems, machines, and equipment has injured, maimed, and killed many workers. One serious injury can stop the growth of your business in its tracks. Management of Hazardous Energy: Deactivation, De-Energization, Isolation, and Lockout provides the practical tools needed to assess hazardous energy in...

Manual of Forensic Taphonomy
Manual of Forensic Taphonomy

Forensic taphonomy is the study of the postmortem changes to human remains, focusing largely on environmental effects―including decomposition in soil and water and interaction with plants, insects, and other animals. While other books have focused on subsets such as forensic botany and entomology, Manual of Forensic Taphonomy is...

Foundations of Statistical Algorithms: With References to R Packages (Chapman & Hall/CRC Computer Science and Data Analysis)
Foundations of Statistical Algorithms: With References to R Packages (Chapman & Hall/CRC Computer Science and Data Analysis)

A new and refreshingly different approach to presenting the foundations of statistical algorithms, Foundations of Statistical Algorithms: With References to R Packages reviews the historical development of basic algorithms to illuminate the evolution of today’s more powerful statistical...

Advanced Video Communications over Wireless Networks
Advanced Video Communications over Wireless Networks

Wireless video communications encompass a broad range of issues and opportunities that serve as the catalyst for technical innovations. To disseminate the most recent advances in this challenging yet exciting field, Advanced Video Communications over Wireless Networks provides an in-depth look at the fundamentals, recent technical...

Shadow Algorithms Data Miner
Shadow Algorithms Data Miner

Shadow Algorithms Data Miner provides a high-level understanding of the complete set of shadow concepts and algorithms, addressing their usefulness from a larger graphics system perspective. It discusses the applicability and limitations of all the direct illumination approaches for shadow generation.

...

Handbook of Approximate Bayesian Computation (Chapman & Hall/CRC Handbooks of Modern Statistical Methods)
Handbook of Approximate Bayesian Computation (Chapman & Hall/CRC Handbooks of Modern Statistical Methods)

As the world becomes increasingly complex, so do the statistical models required to analyse the challenging problems ahead. For the very first time in a single volume, the Handbook of Approximate Bayesian Computation (ABC) presents an extensive overview of the theory, practice and application of ABC methods. These simple, but...

Anonymous Communication Networks: Protecting Privacy on the Web
Anonymous Communication Networks: Protecting Privacy on the Web

In today’s interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy.

Addressing the demand for authoritative information on
...

Real-Time Digital Signal Processing from MATLAB® to C with the TMS320C6x DSPs, Second Edition
Real-Time Digital Signal Processing from MATLAB® to C with the TMS320C6x DSPs, Second Edition

From the Foreword:

"…There are many good textbooks today to teach digital signal processing, but most of them are content to teach the theory, and perhaps some MATLAB® simulations. This book has taken a bold step forward. It not only presents the theory, it reinforces...

Power, National Security, and Transformational Global Events: Challenges Confronting America, China, and Iran
Power, National Security, and Transformational Global Events: Challenges Confronting America, China, and Iran

As the United States struggled to survive the recent recession, China quietly acquired a vast amount of U.S. Treasury bills and bonds. With China now holding so much of America’s debt, currency valuation issues have already caused tensions between the two superpowers. Couple this with Iran’s efforts to develop into a nuclear power...

Result Page: Previous 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 2021 2022 2023 2024 2025 2026 2027 2028 2029 2030 2031 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy