Home | Amazing | Today | Tags | Publishers | Years | Search 
Architectures for Baseband Signal Processing
Architectures for Baseband Signal Processing

This book addresses challenges faced by both the algorithm designer and the chip designer, who need to deal with the ongoing increase of algorithmic complexity and required data throughput for today’s mobile applications. The focus is on implementation aspects and implementation constraints of individual components that are needed in...

Biodegradable Polymer-Based Scaffolds for Bone Tissue Engineering (SpringerBriefs in Applied Sciences and Technology)
Biodegradable Polymer-Based Scaffolds for Bone Tissue Engineering (SpringerBriefs in Applied Sciences and Technology)

This book addresses the principles, methods and applications of biodegradable polymer based scaffolds for bone tissue engineering. The general principle of bone tissue engineering is reviewed and the traditional and novel scaffolding materials, their properties and scaffold fabrication techniques are explored. By acting as temporary synthetic...

Analysis of Engineering Drawings and Raster Map Images
Analysis of Engineering Drawings and Raster Map Images

This book covers up-to-date methods and algorithms for the automated analysis of engineering drawings and digital cartographic maps. The Non-Deterministic Agent System (NDAS) offers a parallel computational approach to such image analysis. The book describes techniques suitable for persistent and explicit knowledge representation for...

Quantum Attacks on Public-Key Cryptosystems
Quantum Attacks on Public-Key Cryptosystems

The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no...

Counterfeit Integrated Circuits: Detection and Avoidance
Counterfeit Integrated Circuits: Detection and Avoidance

This timely and exhaustive study offers a much-needed examination of the scope and consequences of the electronic counterfeit trade.  The authors describe a variety of shortcomings and vulnerabilities in the electronic component supply chain, which can result in counterfeit integrated circuits (ICs).  Not only does this book provide...

Plasticity in Plant-Growth-Promoting and Phytopathogenic Bacteria
Plasticity in Plant-Growth-Promoting and Phytopathogenic Bacteria

Plasticity in Plant-Growth-Promoting and Phytopathogenic Bacteria brings together the expertise of a panel of researchers from around the world to provide comprehensive up-to-date reviews on the most interesting aspects of genomic and phenotypic plasticity in plant-beneficial and phytopathogenic bacteria.

The book covers...

Adherence to Antipsychotics in Schizophrenia
Adherence to Antipsychotics in Schizophrenia

Poor adherence to therapy is one of the main obstacles to treatment effectiveness in schizophrenia. It is the main determinant of relapse, hospitalization, symptom persistence, and poor psychosocial functioning and outcome. Adherence to treatment is affected by various factors related to the disease characteristics, to the patient him- or...

Handbook on the History of Mathematics Education
Handbook on the History of Mathematics Education

This is the first comprehensive International Handbook on the History of Mathematics Education, covering a wide spectrum of epochs and civilizations, countries and cultures. Until now, much of the research into the rich and varied history of mathematics education has remained inaccessible to the vast majority of scholars, not least...

Understanding Petri Nets: Modeling Techniques, Analysis Methods, Case Studies
Understanding Petri Nets: Modeling Techniques, Analysis Methods, Case Studies

With their intuitive graphical approach and expressive analysis techniques, Petri nets are suitable for a wide range of applications and teaching scenarios, and they have gained wide acceptance as a modeling technique in areas such as software design and control engineering. The core theoretical principles have been studied for many decades...

Security-aware Cooperation in Cognitive Radio Networks (SpringerBriefs in Computer Science)
Security-aware Cooperation in Cognitive Radio Networks (SpringerBriefs in Computer Science)

This brief investigates spectrum efficient and energy efficient strategies, known as cognitive radio networks (CRNs), to ensure secure cooperation between licensed and unlicensed users. The authors address issues of spectrum scarcity, spectrum sensing, transmission performance, trust-aware cooperation, and secure communications. Two...

Baustatik in Beispielen (German Edition)
Baustatik in Beispielen (German Edition)

Ingenieurwissenschaftliche Zusammenhänge erschließen sich häufig erst bei der Bearbeitung konkreter Aufgaben. Genau an dieser Stelle setzt das Buch an: Es präsentiert die wesentlichen Gebiete der Statik von Stabtragwerken anhand von detailliert ausgearbeiteten Beispielen. Die Aufgaben können sowohl „von...

Fundamentals of Space Medicine (Space Technology Library)
Fundamentals of Space Medicine (Space Technology Library)

This readable text presents findings from the life science experiments conducted during and after space missions. It provides an insight into the space medical community and the real challenges that face the flight surgeon and life science investigator.

...
Result Page: 163 162 161 160 159 158 157 156 155 154 153 152 151 150 149 148 147 146 145 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy