Electronic Books

Total Books: 1481 - 1500 /5761
Craniofacial 3D Imaging: Current Concepts in Orthodontics and Oral and Maxillofacial Surgery

This book is designed to serve as an up-to-date reference on the use of cone-beam computed tomography for the purpose of ...

Lire la suite
Creating Assertion-Based Verification IP

The focus of this book is to bring the assertion discussion up to a higher level and introduce a process for creating effective, ...

Lire la suite
Creating Cool MINDSTORMS® NXT Robots

Build and program MINDSTORM NXT robots with Daniele Benedettelli, one of the world's most respected NXT robot builders. ...

Lire la suite
NoIMG
Creating Resilient Futures : Integrating Disaster Risk Reduction, Sustainable Development Goals and Climate Change Adaptation Agendas

This excellent text recognises that efforts towards improving development outcomes must work in concert with strategies which ...

Lire la suite
Creative Character Design for Games and Animation / Jenny Harder

Takes you through all the basic steps of character design for games and animation, from brainstorming and references to the ...

Lire la suite
Creative Model Construction in Scientists and Students

How do scientists use analogies and other processes to break away from old theories and generate new ones? This book documents ...

Lire la suite
NoIMG
Crime detection camera / Adnan Aji , Duha Aljubbeh , Laila Tarabih , Marwan Osta Halabi and Nour Alhuda Zeiter ; Supervised by Raouf Hamdan and Massa Albaali عدنان عامر عاجي ، ضحى الجبة ، ليلى طرابية ، مروان الاسطة حلبي و نور الهدى محمد رضا زعيتر ؛ إشراف رؤوف حمدان و ماسة البعلي

This paper presents a comprehensive crime detection system that uses a combination of hardware and software to monitor homes ...

Lire la suite
Crimean-Congo Hemorrhagic Fever

Crimean-Congo hemorrhagic fever (CCHF) is a tick-borne disease associated with severe hemorrhagic manifestations. CCHF has ...

Lire la suite
Criminal Dilemmas

Fighting crime breeds emotional responses which often lead to counter-productive government policy. To allow a rational analysis ...

Lire la suite
Criminal Profiling

Criminal Profiling: Principles and Practice provides a compendium of original scientific research on constructing a criminal ...

Lire la suite
Criminalising Harmful Conduct

This book explores the issue of legitimate criminalization in a modern, liberal society. Coverage provides a comparative ...

Lire la suite
Crisis and Legitimacy in Atlantic American Narratives of Piracy 1678-1865

This book, Crisis and Legitimacy in Atlantic American Narratives of Piracy: 1678-1865, examines literary and visual representations ...

Lire la suite
Critical Infrastructure : Reliability and Vulnerability

This text brings together differing geographic perspectives in modelling and analysis in order to highlight infrastructure ...

Lire la suite
Critical Issues in Head and Neck Oncology Key Concepts from the Seventh THNO Meeting

This book discusses the most current issues in head and neck cancer with a focus on current trends such as biomarkers, precision ...

Lire la suite
Critical Issues in Head and Neck Oncology : Key Concepts from the Eighth THNO Meeting / Jan B. Vermorken, Volker Budach, C. René Leemans, Jean-Pascal Machiels, Piero Nicolai, Brian O'Sullivan

Reviews the state-of-the-art knowledge with emphasis on multidisciplinary decision and management of head and neck cancer. ...

Lire la suite
Critical Point Theory and Its Applications

The book include extrema, even valued functionals, weak and double linking, sign changing solutions, Morse inequalities, ...

Lire la suite
Critical Point Theory and Its Applications

The book include extrema, even valued functionals, weak and double linking, sign changing solutions, Morse inequalities, ...

Lire la suite
Crowd Simulation

Focuses on methods and techniques for crowd simulation, filling the gap in the professional literature. This survey covers ...

Lire la suite
Cryogenic Mixed Refrigerant Processes

Cryogenic refrigerators operating with refrigerant mixtures were developed under classified and proprietary programs for ...

Lire la suite
Cryptanalytic Attacks on RSA

RSA is a public-key cryptographic system, and is the most famous and widely-used cryptographic system in today's digital ...

Lire la suite
Total Books: 1481 - 1500 /5761