Home | Amazing | Today | Tags | Publishers | Years | Search 
Noise Reduction in Speech Processing (Springer Topics in Signal Processing)
Noise Reduction in Speech Processing (Springer Topics in Signal Processing)

Noise is everywhere and in most applications that are related to audio and speech, such as human-machine interfaces, hands-free communications, voice over IP (VoIP), hearing aids, teleconferencing/telepresence/telecollaboration systems, and so many others, the signal of interest (usually speech) that is picked up by a microphone is generally...

How Electronic Things Work... And What to do When They Don't
How Electronic Things Work... And What to do When They Don't

Electronic equipment 'on the blink'? Don't junk it or pay sky-high repair costs - fix it yourself! Here's a guide to understanding and repairing electronics equipment written for people who would ordinarily 'call the shop'. With this fully illustrated, simple-to-use guide, you will get a grasp of the workings of the...

Designing for Small Screens: Mobile Phones, Smart Phones, PDAs, Pocket PCs, Navigation Systems, MP3 Players, Game Consoles
Designing for Small Screens: Mobile Phones, Smart Phones, PDAs, Pocket PCs, Navigation Systems, MP3 Players, Game Consoles

The design of interactive applications or presentations on small screens can be challenging for the designer. Not all design concepts that are valid on larger screens can be implemented on the small screen. A multitude of different devices with dissimilar technical specifications fall under the category of small- screen interfaces. Devices in...

Lonely Planet Discover Egypt (Country Guide)
Lonely Planet Discover Egypt (Country Guide)

Experience The Best of Egypt
The Pyramids of Giza, Siwa Oasis, Luxor Museum – we’ve selected the most iconic sights and incredible places so you can enjoy the real Egypt with the minimum of fuss.

Highlights reveal the must-see attractions and unbeatable experiences
Itineraries
...

RNA and DNA Editing: Methods and Protocols (Methods in Molecular Biology)
RNA and DNA Editing: Methods and Protocols (Methods in Molecular Biology)

The recent expansion in diversity of RNA and DNA editing types has stimulated the development of many unique genetic, molecular, biochemical, and computational approaches to biological issues.  In RNA and DNA Editing: Methods and Protocols, leading experts in the field introduce methods developed over the last few years to study...

PCI-X System Architecture
PCI-X System Architecture

The PCI-X bus will start appearing in advanced PCs within months, delivering breakthrough performance, transfer rates of up to 1.06 Gb/sec, and backward compatibility with the PCI standard. Now, there's a comprehensive guide to PCI-X, covering everything engineers and developers need to create robust, reliable PCI-X boards and software....

Invisible Capital: How Unseen Forces Shape Entrepreneurial Opportunity
Invisible Capital: How Unseen Forces Shape Entrepreneurial Opportunity

Writer, consultant and speaker Chris Rabb coined the term "invisible capital" to represent the unseen forces that dramatically impact entrepreneurial viability when a good attitude, a great idea, and hard work simply aren't enough.

In his book, Invisible Capital: How Unseen Forces Shape
...

Increase Your Web Traffic in a Weekend
Increase Your Web Traffic in a Weekend

These days, everyone seems to have a home page or a Web site. However, just because you create and publish a Web site doesn't mean anyone will visit it. Competition to attract visitors is extreme. The reality is that of the millions of Web pages out there, only a handful actually attract a steady readership; and these same Web pages are...

Blackhatonomics: An Inside Look at the Economics of Cybercrime
Blackhatonomics: An Inside Look at the Economics of Cybercrime

Would you be surprised if I say that the essence of cyber-crime comes down to traditional theft of property—be that of funds in accounts, of company data (and the financial harm that can cause), or of personal/confidential information (and the damage that can cause by it winding up in the wrong hands)? As time goes by, hackers, virus...

Introduction to Real Analysis
Introduction to Real Analysis

This text provides the fundamental concepts and techniques of real analysis for students in all of these areas. It helps one develop the ability to think deductively, analyse mathematical situations and extend ideas to a new context. Like the first three editions, this edition maintains the same spirit and user-friendly approach with addition...

Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure
Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure
Cyber security is big business today. Smart Grid is big business today. Therefore let’s put the two together and write a book? Well, surely there will be some individuals that may make that assumption as to the motivation behind the publication of this book. The real motivation behind the development of this book is because...
Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects
Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects

Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work of a case investigator in order to build a solid case to identify...

Result Page: 2246 2245 2244 2243 2242 2241 2240 2239 2238 2237 2236 2235 2234 2233 2232 2231 2230 2229 2228 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy