Search ResultsElectronic Resources 
Limit Search Results
by
Verde, Cristina. editor.
Format:
Excerpt:
researchers and professionals in the areas of mechanical, civil and control engineering. It covers topics on
by
Bhatti, Asim. editor.
Format:
Excerpt:
interfacing technologies, as well as novel information acquisition and processing algorithms to make sense of
by
Liu, Shih-Chii, editor.
Format:
Excerpt:
inspired by the brain's efficient data-driven communication design, which is key to its quick responses and
by
Ribeiro, Paulo F.
Format:
Excerpt:
data, several Matlab codes with examples, DSP scripts and samples of signals for further processing
by
Drobny, Jiri George.
ScienceDirect http://www.sciencedirect.com/science/book/9780815515494
Format:
Excerpt:
. Copiously illustrated and full of applicable processing and engineering data, this is the very definition of
by
Massey, Liesl K.
ScienceDirect http://www.sciencedirect.com/science/book/9781884207945
Format:
Excerpt:
engineering properties of commercial polymeric films details many physical, mechanical, optical, electrical
by
Farin, Gerald E.
ScienceDirect http://www.sciencedirect.com/science/book/9780444511041
Format:
Excerpt:
Surface NC Machining / Cyclides / Geometry Processing / Intersection Problems -- Reverse Engineering
by
Mulders, Michel Adrianus, 1941-
ScienceDirect http://www.sciencedirect.com/science/book/9780444427830
Format:
Excerpt:
interpreting remote sensing data, and their application to soils, vegetation, and land as a whole. As the
by
Adlmann, Franz Alois, author.
Format:
Excerpt:
possible with a time resolution below one millisecond. Second, the transformation of grazing incidence data
by
Patnaik, Srikanta. editor.
Format:
Excerpt:
information security, signal, image and video processing, network management, and traffic engineering. And
by
Chaki, Rituparna. editor.
Format:
Excerpt:
Image Processing, Biometrics-based Authentication, Soft Computing, Data Mining, Next
by
Chaki, Rituparna. editor.
Format:
Excerpt:
Image Processing, Biometrics-based Authentication, Soft Computing, Data Mining, Next

Select an Action




