Home | Amazing | Today | Tags | Publishers | Years | Search 
PIC Robotics: A Beginner's Guide to Robotics Projects Using the PIC Micro
PIC Robotics: A Beginner's Guide to Robotics Projects Using the PIC Micro
Complete, do-it-yourself robotics projects!

SMART 'BOTS!

* Artificial vision system that uses a CCD camera to track and follow brightly colored objects
* Bi-pedal robots that walk upright
* Functional robotic arm
* Easily programmed behavior-based robots
* Complete parts
...
Advanced Java 2 Platform: How to Program (With CD-ROM)
Advanced Java 2 Platform: How to Program (With CD-ROM)
The authoritative DEITEL LIVE-CODE guide to programming with the Java 2 Enterprise (J2SE), Standard (J2SE) and Micro (J2ME) Editions

Java has revolutionized application and enterprise-systems...

Signal Processing and Linear Systems
Signal Processing and Linear Systems
This text presents a comprehensive treatment of signal processing and linear systems suitable for juniors and seniors in electrical engineering. Based on B. P. Lathi's widely used book, Linear Systems and Signals, it features additional applications to communications, controls, and filtering as well as new chapters on analog and digital filters and...
Going Wi-Fi: A Practical Guide to Planning and Building an 802.11 Network
Going Wi-Fi: A Practical Guide to Planning and Building an 802.11 Network

Make informed decisions about planning and installing 802.11 “Wi-Fi” wireless networks. This book helps you tackle the challenge, whether installing Wi-Fi within an existing corporate network, or setting up a wireless network from scratch in any business or organization. Author Janice Reynolds guides you through everything you need...

Hunting Security Bugs
Hunting Security Bugs

Your essential reference to software security testing—from the experts.

Learn how to think like an attacker—and identify potential security issues in your software. In this essential guide, security testing experts offer practical, hands-on guidance and code samples to help you find, classify, and assess security bugs before...

Hybrid Architectures for Intelligent Systems
Hybrid Architectures for Intelligent Systems

The interaction between Fuzzy Set theory and Neural Network theory is multi-faceted and occurs at many different levels. The connection between these two concepts occurs both in the framework of real and artificial neural systems.

The brain is not just a collection of neurons grouped together at some part of the animal’s body,...

Developing Intranet Applications With Java
Developing Intranet Applications With Java

Networks aren't the same since the Java programming language and intranets burst onto the scene. A few years ago, no one had heard of the programming language named after the pervasive liquid that energizes millions. Today, not only is the Java programming language a buzzword in the computer industry, it is fueling a period of tremendous growth...

Objects, Components, and Frameworks with UML: The Catalysis(SM) Approach
Objects, Components, and Frameworks with UML: The Catalysis(SM) Approach

". . . We found Catalysis to be the first comprehensive object-oriented methodology to unify the concepts of objects, frameworks, and component technologies."
John McGehee, Senior Architect, Texas Instruments Works Project

Objects, Components, and Frameworks with UML: The Catalysis Approach is where you will...

Principles of Data Mining (Adaptive Computation and Machine Learning)
Principles of Data Mining (Adaptive Computation and Machine Learning)

The growing interest in data mining is motivated by a common problem across disciplines: how does one store, access, model, and ultimately describe and understand very large data sets? Historically, different aspects of data mining have been addressed independently by different disciplines. This is the first truly...

Fundamentals of Switching Theory and Logic Design: A Hands on Approach
Fundamentals of Switching Theory and Logic Design: A Hands on Approach
Information Science and Digital Technology form an immensely complex
and wide subject that extends from social implications of technological
development to deep mathematical foundations of the techniques
that make this development possible. This puts very high demands
on the education of computer science and engineering. To be
...
Multimedia Security Technologies for Digital Rights Management
Multimedia Security Technologies for Digital Rights Management
A timely reference in the innovative and cutting-edge field of multimedia security!

Digital Rights Management (DRM) defines a set of tools that manage the secured use of digital media content found on static and mobile electronic devices, ranging from personal computers and PDAs to digital video recorders and MP3
...
DVD Demystified
DVD Demystified
"This is not merely ‘a’ good book to help you make sense of DVD, it is ‘the’ book that you will return to over and over as you explore and come to understand this exciting new optical media format." - Geoffrey Tully, Multimedia Technology Consultant; former Senior VP of Production, Divx Entertainment

DVD is...

Result Page: 501 500 499 498 497 496 495 494 493 492 491 490 489 488 487 486 485 484 483 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy