This reference describes techniques for controlling the RCS of targets, provides analytical methods for estimating RCS, develops models for the design of low RCS targets and antennas, and discusses several RCS enhancement techniques.[...]
With the rapid rise in the ubiquity and sophistication of Internet technology and the accompanying growth in the number of network attacks, network intrusion detection has become increasingly important. Anomaly-based network intrusion detection refers to finding exceptional or nonconforming patterns[...]
This is a comprehensive source of information on the application of ion chromatography (IC) in the analysis of pharmaceutical drugs and biologicals.[...]
This title presents techniques for optimizing multiprocessor implementations of signal processing applications. An indispensable component of the information age, signal processing is embedded in a variety of consumer devices, including cell phones and digital television, as well as in communication[...]
This accessible text explains machine translation through the study of phenomena, formalization, and elucidation of the techniques. It extensively uses case studies, examples, and historical perspectives. The book lucidly covers the foundations, insights, and case studies for practical concerns. The[...]
The book studies the different aspects of Tantrism. Its vastness and intricacies, its heterogeneous and contradictory elements and gives a historical perspective to the conglomeration of ideas and practices through space and time. It also incorporates a review of Tantric art and a glossary of techni[...]
The purpose of Numerical Linear Algebra in Signals, Systems and Control is to present an interdisciplinary book, blending linear and numerical linear algebra with three major areas of electrical engineering: Signal and Image Processing, and Control Systems and Circuit Theory. Numerical Linear Algebr[...]