- Robotics (Intelligent Systems, Control and Automation: Science and Engineering)
- The Ecology of Building Materials, Second Edition
- Brilliant HTML & CSS
- Principles of Computer Systems and Network Management
- Software Sizing, Estimation, and Risk Management: When Performance is Measured Performance Improves
- MCSE 70-293 Exam Prep: Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure (2nd Edition)
- Introduction to the Mathematics for Computer Graphics
- PC Interfacing
- Introduction to Fuzzy Logic Using Matlab
- Security Informatics, Vol. 9
Posted: 29 Jan 2010 03:31 PM PST
This supplementary introductory tutorial treats the following subjects: the basic characteristics of industrial robot mechanisms; the pose and movement of an object, which are described by homogenous transformation matrices; a geometric model of robot mechanism; a short introduction into kinematics and dynamics of robots; robot sensors and the planning of robot trajectories; basic control schemes resulting in either desired end-effector trajectory or force; robot grippers and feeding devices, which are described together with the basics of robot vision; the planning of robot assembly; and finally, robot standards and safety are briefly dealt with. The book concludes with a glossary in English, French and German.
Posted: 29 Jan 2010 03:30 PM PST
Silver Award Winner at the Chartered Institute of Buildings Literary Awards:
‘[The book] is tightly packed with text, tables, references and illustrations; it is thorough…and it is wide-ranging in coverage of materials and techniques, both familiar and less so.’
‘…an amazingly comprehensive and thorough resource, full of gems of wisdom, and anyone seriously interested in exploring alternatives to mainstream materials will find a great deal of useful material.’
Posted: 29 Jan 2010 03:28 PM PST
Posted: 29 Jan 2010 03:27 PM PST
This textbook provides an overview of the field of computer systems and network management. Systems management courses are being taught in different graduate and undergraduate computer science programs, but there are no good books with a comprehensive overview of the subject. This text book will provide content appropriate for either an undergraduate course (junior or senior year) or a graduate course in systems management. Systems Management is emerging as the predominant area for computer science in the enterprise, with studies showing that the bulk (up to 80%) of an enterprise IT budget is spent on management/operational issues and is the largest piece of the expenditure.
Posted: 29 Jan 2010 03:26 PM PST
To achieve consistent software project success under the pressures of today’s software development environment, software organizations require achievable plans including viable estimates of schedule, resources, and risks. To estimate realistically, you must understand how to apply sound estimation processes, tools, and data.
Posted: 29 Jan 2010 03:25 PM PST
The MCSE 70-293 Exam Prep is the most accurate, comprehensive, and up-to-date study guide if you are preparing for one of the four core exams required of this popular Microsoft certification. Updated for R2 versions of the product and the exam, this book serves as both a learning and practice tool. Organized according to the exam objectives, which help you quickly and easily assess your understanding of the key exam topics, the book features several key features that help you score better on the test: exam objective explanations, notes, tips, warnings, key terms, exercises, step-by-step examples, study strategies, fast facts, as well as multiple self-assessment opportunities. This is the ultimate study guide to help you prepare for this required MCSE exam. The 70-293 exam measures the ability to plan and maintain a Microsoft Windows Server 2003 network infrastructure.
Posted: 29 Jan 2010 03:24 PM PST
1.3 Who Should Read This Book?
1.4 Aims and Objectives of This Book
1.5 Assumptions Made in This Book
1.6 How to Use This Book
Posted: 29 Jan 2010 03:22 PM PST
The main links with your PC and the outside world are the centronic port, used for connecting the printer, the RS232 port, used for the mouse, and the games port for a joystick. This book explores how these input/output (I/O) ports can be put to use through a range of other interfacing applications. This is especially useful for laptop and palmtop PCs which cannot be fitted with internal I/O cards. A novel approach is taken by this book, combining the hardware through which the ports can be explored, and the software programming needed to carry out a range of experiments.
Posted: 29 Jan 2010 03:20 PM PST
Fuzzy Logic, at present is a hot topic, among academicians as well various programmers. This book is provided to give a broad, in-depth overview of the field of Fuzzy Logic. The basic principles of Fuzzy Logic are discussed in detail with various solved examples. The different approaches and solutions to the problems given in the book are well balanced and pertinent to the Fuzzy Logic research projects. The applications of Fuzzy Logic are also dealt to make the readers understand the concept of Fuzzy Logic. The solutions to the problems are programmed using MATLAB 6.0 and the simulated results are given. The MATLAB Fuzzy Logic toolbox is provided for easy reference.
Posted: 29 Jan 2010 03:19 PM PST
Intelligence and Security Informatics (ISI) is defined as the study of the development and use of advanced information systems and technologies for national, international, and societal security-related applications. ISI topics include ISI data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, information assurance, and other related topics. With the rise of global terrorism, the field has been given an increasing amount of attention from academic researchers, law enforcement, intelligent experts, information technology consultants and practitioners.
SECURITY INFORMATICS is global in scope and perspective. Leading experts will be invited as contributing authors from the US, UK, Denmark, Israel, Singapore, Hong Kong, Taiwan, Europe, etc. It is the first systematic, archival volume treatment of the field; the volume will cover the very latest advances in ISI research and practice. It is organized in four major subject areas: (1) Information and Systems Security, (2) Information Sharing and Analysis in Security Informatics, (3) Infrastructure Protection and Emergency Responses, and (4) National Security and Terrorism Informatics. The volume features high-quality contributions from worldwide leading experts across a variety of discipline domains. Each contribution follows a uniform structure and has undergone a thorough peer-review process.
|You are subscribed to email updates from Download Free Computer Ebooks - NET BOOKS |
To stop receiving these emails, you may unsubscribe now.
|Email delivery powered by Google|
|Google Inc., 20 West Kinzie, Chicago IL USA 60610|