eBooks-it.org Logo
eBooks-IT.org Inner Image

CRC Press eBooks

Download free CRC Press eBooks

Computational Neuroscience

A Comprehensive Approach
Computational Neuroscience Image
How does the brain work? After a century of research, we still lack a coherent view of how neurons process signals and control our activities. But as the field of computational neuroscience continues to evolve, we find that it provides a theoretical foundation and a set of technological approaches that can significantly enhance our understanding.Computational Neuroscience: A Comprehensive Approach provides a unified treatment of the mathematical theory of the nervous system and presents concrete examples demonstrating how computational techniques can illuminate difficult neuroscience problems. In chapters contributed by top researchers, the book introduces the basic mathematical concepts, then examines modeling at all levels, from single-channel and ...

Coarse Wavelength Division Multiplexing

Technologies and Applications
Coarse Wavelength Division Multiplexing Image
Explaining what CWDM is, how it is achieved, and why it should be deployed, Coarse Wavelength Division Multiplexing: Technologies and Applications merges coverage of isolated aspects of Coarse Wavelength Division Multiplexing (CWDM) traditionally found as device-related or specific system topics. Emphasizing cost savings and performance enhancement, the book integrates information on component issues, system architectures, concepts for extensions and upgrades, as well as practical applications into a comprehensive, single-volume resource.Beginning with a summary of the ITU-T standards defining CWDM, the book addresses the three essential component classes, optical fibers, transceivers, and WDM filters, which combine to form the basis for the CWDM tra...

Cyber and Electromagnetic Threats in Modern Relay Protection

Cyber and Electromagnetic Threats in Modern Relay Protection Image
Cyber and Electromagnetic Threats in Modern Relay Protection provides a detailed overview of the vulnerabilities of digital protection relays to natural and intentional destructive impacts, including cyber attacks and electromagnetic intrusions. From lightning strikes, electromagnetic fields generated by operating equipment, and issues with control cable shielding to modern technical tools that realize intentional destructive impacts remotely, this first-of-its-kind text covers the latest cyber and electromagnetic threats to digital protection relays. Emphasizing the importance of relay protection to the infrastructure of a country, this book: Explains how technological advances in the power industry, like the smart grid, can create dangerous vulne...

Introduction to Game Physics with Box2D

Introduction to Game Physics with Box2D Image
Written by a pioneer of game development in academia, Introduction to Game Physics with Box2D covers the theory and practice of 2D game physics in a relaxed and entertaining yet instructional style. It offers a cohesive treatment of the topics and code involved in programming the physics for 2D video games. Focusing on writing elementary game physics code, the first half of the book helps you grasp the challenges of programming game physics from scratch, without libraries or outside help. It examines the mathematical foundation of game physics and illustrates how it is applied in practice through coding examples. The second half of the book shows you how to use Box2D, a popular open source 2D game physics engine. A companion website provides supple...

Project Scope Management

A Practical Guide to Requirements for Engineering, Product, Construction, IT and Enterprise Projects
Project Scope Management Image
Incomplete or missed requirements, omissions, ambiguous product features, lack of user involvement, unrealistic customer expectations, and the proverbial scope creep can result in cost overruns, missed deadlines, poor product quality, and can very well ruin a project. Project Scope Management: A Practical Guide to Requirements for Engineering, Product, Construction, IT and Enterprise Projects describes how to elicit, document, and manage requirements to control project scope creep. It also explains how to manage project stakeholders to minimize the risk of an ever-growing list of user requirements.The book begins by discussing how to collect project requirements and define the project scope. Next, it considers the creation of work breakdown structure...


2007 - 2017 © eBooks-IT.org