This book is designed to serve as an up-to-date reference on the use of cone-beam computed tomography for the purpose of ...
WeiterlesenThe focus of this book is to bring the assertion discussion up to a higher level and introduce a process for creating effective, ...
WeiterlesenBuild and program MINDSTORM NXT robots with Daniele Benedettelli, one of the world's most respected NXT robot builders. ...
WeiterlesenThis excellent text recognises that efforts towards improving development outcomes must work in concert with strategies which ...
WeiterlesenTakes you through all the basic steps of character design for games and animation, from brainstorming and references to the ...
WeiterlesenHow do scientists use analogies and other processes to break away from old theories and generate new ones? This book documents ...
WeiterlesenThis paper presents a comprehensive crime detection system that uses a combination of hardware and software to monitor homes ...
WeiterlesenCrimean-Congo hemorrhagic fever (CCHF) is a tick-borne disease associated with severe hemorrhagic manifestations. CCHF has ...
WeiterlesenFighting crime breeds emotional responses which often lead to counter-productive government policy. To allow a rational analysis ...
WeiterlesenCriminal Profiling: Principles and Practice provides a compendium of original scientific research on constructing a criminal ...
WeiterlesenThis book explores the issue of legitimate criminalization in a modern, liberal society. Coverage provides a comparative ...
WeiterlesenThis book, Crisis and Legitimacy in Atlantic American Narratives of Piracy: 1678-1865, examines literary and visual representations ...
WeiterlesenThis text brings together differing geographic perspectives in modelling and analysis in order to highlight infrastructure ...
WeiterlesenThis book discusses the most current issues in head and neck cancer with a focus on current trends such as biomarkers, precision ...
WeiterlesenReviews the state-of-the-art knowledge with emphasis on multidisciplinary decision and management of head and neck cancer. ...
WeiterlesenThe book include extrema, even valued functionals, weak and double linking, sign changing solutions, Morse inequalities, ...
WeiterlesenThe book include extrema, even valued functionals, weak and double linking, sign changing solutions, Morse inequalities, ...
WeiterlesenFocuses on methods and techniques for crowd simulation, filling the gap in the professional literature. This survey covers ...
WeiterlesenCryogenic refrigerators operating with refrigerant mixtures were developed under classified and proprietary programs for ...
WeiterlesenRSA is a public-key cryptographic system, and is the most famous and widely-used cryptographic system in today's digital ...
Weiterlesen