Radio frequency identification (RFID) uses radio waves to identify any object,through the RFID tag identifier number. This book focuses on ultralightweight authentication protocols. HungYu Chien...
Intensional programming is a programming language paradigm based on the declarative notions where the declarations are evaluated in a multidimensional context space. Program identifiers are...
A number of libraries in Malawi have made attempts to create digital libraries, a midst several challenges. This book examines the implementation and usage of...
Mixeduse urban design projects in center cities are a complex undertaking. Numerous mixeduse developments are conceptualized each year, but few evolve into real projects and...
The fused multiply add (FMA) operation is very important in many scientific and engineering applications. It is a key feature of the floatingpoint unit (FPU),...
Historically, the electricity grid is designed to collect large amounts of energy from power generation and distribution to a large number of customers and users....
**Biometric Technologies (BT) are important multidisciplinary research areas targeted at automatic identity verification applications. Verification processes especially based on behaviour do not show 100 %...
Temperature gradient causes volume change in concrete structures. If the movement of the structure is restrained, significant stresses may occur on the structure. These stresses...
The three phase inverter (using MOSFETs) is designed successfully.The PWM pulses are generated using VHDL.The Field Programmable Gate Array is used.The four modes 00 to...
It is assumed worldwide that expanding womens representation in the parliament through a quota system represents one of the strategies leading to womens empowerment. Engaging...
The optimal deployment of inventory is a vital business function, as inventory ties up working capital and increases operating costs, which ultimately impacts profits. Optimum...
Most organizations at present employ Role Based Access Control (RBAC) model for Information Security, an effective technique to manage user access rights. As RBAC constraints...
Hydrogen and fuel cell technologies are breaking technologies, potentially penetrating in every segment of social life. It is therefore of paramount importance to understand when...
<div class="dynamic-checkout__content" id="dynamic-checkout-cart" data-shopify="dynamic-checkout-cart"> <shopify-accelerated-checkout-cart wallet-configs="[{"name":"shop_pay","wallet_params":{"shopId":73758048501,"merchantName":"Ergodebooks","personalized":true}},{"name":"amazon_pay","wallet_params":{"checkoutLanguage":"en_US","ledgerCurrency":"USD","placement":"Cart","sandbox":false,"merchantId":"A1G1ZY975O1T6J","productType":"PayAndShip","design":"C0002"}},{"name":"paypal","wallet_params":{"shopId":73758048501,"countryCode":"US","merchantName":"Ergodebooks","phoneRequired":true,"companyRequired":false,"shippingType":"shipping","shopifyPaymentsEnabled":true,"hasManagedSellingPlanState":false,"requiresBillingAgreement":false,"merchantId":"L873BZSC9NMQS","sdkUrl":"https://www.paypal.com/sdk/js?components=buttons\u0026commit=false\u0026currency=USD\u0026locale=en_US\u0026client-id=AbasDhzlU0HbpiStJiN1KRJ_cNJJ7xYBip7JJoMO0GQpLi8ePNgdbLXkC7_KMeyTg8tnAKW4WKrh9qmf\u0026merchant-id=L873BZSC9NMQS\u0026intent=authorize"}}]" access-token="c0f52a66b386e9fa5c0ab4c2febc737c" buyer-country="US" buyer-locale="en" buyer-currency="USD" shop-id="73758048501" cart-id="21368005d4c5e0e091af371965d5bd6d" > <div class="wallet-button-wrapper"> <ul class='wallet-cart-grid wallet-cart-grid--skeleton' role="list" data-shopify-buttoncontainer="true"> <li data-testid='grid-cell' class='wallet-cart-button-container'><div class='wallet-cart-button wallet-cart-button__skeleton' role='button' disabled aria-hidden='true'> </div></li><li data-testid='grid-cell' class='wallet-cart-button-container'><div class='wallet-cart-button wallet-cart-button__skeleton' role='button' disabled aria-hidden='true'> </div></li><li data-testid='grid-cell' class='wallet-cart-button-container'><div class='wallet-cart-button wallet-cart-button__skeleton' role='button' disabled aria-hidden='true'> </div></li> </ul> </div> </shopify-accelerated-checkout-cart> <small id="shopify-buyer-consent" class="hidden" aria-hidden="true" data-consent-type="subscription"> One or more of the items in your cart is a recurring or deferred purchase. By continuing, I agree to the <span id="shopify-subscription-policy-button">cancellation policy</span> and authorize you to charge my payment method at the prices, frequency and dates listed on this page until my order is fulfilled or I cancel, if permitted. </small> </div>
Stay in the know
Subscribe to our newsletter and stay updated on latest offers, discounts and events near you.
For MAP (Minimum Advertised Price) violations, please contact: map@ergode.com
For Intellectual Property (IP) or Trademark concerns, please contact: ip@ergode.com
⚠️ California Proposition 65 Warning: Some products sold on this website may expose you to chemicals known to the State of California to cause cancer, birth defects, or other reproductive harm. For more information, visit www.P65Warnings.ca.gov.
Radio frequency identification (RFID) uses radio waves to identify any object,through the RFID tag identifier number. This book focuses on ultralightweight authentication protocols. HungYu Chien...
Intensional programming is a programming language paradigm based on the declarative notions where the declarations are evaluated in a multidimensional context space. Program identifiers are...
A number of libraries in Malawi have made attempts to create digital libraries, a midst several challenges. This book examines the implementation and usage of...
Mixeduse urban design projects in center cities are a complex undertaking. Numerous mixeduse developments are conceptualized each year, but few evolve into real projects and...
The fused multiply add (FMA) operation is very important in many scientific and engineering applications. It is a key feature of the floatingpoint unit (FPU),...
Historically, the electricity grid is designed to collect large amounts of energy from power generation and distribution to a large number of customers and users....
**Biometric Technologies (BT) are important multidisciplinary research areas targeted at automatic identity verification applications. Verification processes especially based on behaviour do not show 100 %...
Temperature gradient causes volume change in concrete structures. If the movement of the structure is restrained, significant stresses may occur on the structure. These stresses...
The three phase inverter (using MOSFETs) is designed successfully.The PWM pulses are generated using VHDL.The Field Programmable Gate Array is used.The four modes 00 to...
It is assumed worldwide that expanding womens representation in the parliament through a quota system represents one of the strategies leading to womens empowerment. Engaging...
The optimal deployment of inventory is a vital business function, as inventory ties up working capital and increases operating costs, which ultimately impacts profits. Optimum...
Most organizations at present employ Role Based Access Control (RBAC) model for Information Security, an effective technique to manage user access rights. As RBAC constraints...
Hydrogen and fuel cell technologies are breaking technologies, potentially penetrating in every segment of social life. It is therefore of paramount importance to understand when...
Sale price$83.54Regular price$119.34
Quantity
Add to cart
Choosing a selection results in a full page refresh.