Search Results (47 titles)

Searched over 21.6 Million titles in 0.28 seconds

 
Literature (X) Most Popular Books in China (X) Technology (X)

       
1
|
2
|
3
Records: 21 - 40 of 47 - Pages: 
  • Cover Image

Rapid Prototyping Technology Applications in Architectual Designs

By: Victor Jimenez

This book contains information about modern technology behind architecture and the study of a successful architectural design and plan.

Read More
  • Cover Image

Drifting Instability in Two Phase Heat Transfer Systems, British Chemical Engineering, Jan 1965, P 6

By: Eugene F. Adiutori

Drifting Instability in Two Phase Heat Transfer Systems, British Chemical Engineering, Jan 1965, p 6

Read More
  • Cover Image

New Theory of Thermal Stability in Boiling Systems, Nucleonics, May, 1964, 22 (5), Pp 92-101

By: Eugene F. Adiutori

New Theory of Thermal Stability in Boiling Systems, Nucleonics, May, 1964, 22 (5), pp 92-101

Read More
  • Cover Image

An Improved Form for Natural Convection Heat Transfer Correlations, Strojniski Vestnikjournal of Mechanical Engineering 51(2005)7-8, Pp 374-378

By: Eugene F. Adiutori

An Improved Form for Natural Convection Heat Transfer Correlations, Strojniski vestnik?Journal of Mechanical Engineering 51(2005)7-8, pp 374-378

Read More
  • Cover Image

Fourier, Mechanical Engineering, August, 2005, Pp 30-31 (A Condensation of Fourierthe Father of Modern Engineering)

By: Eugene F. Adiutori

Fourier, Mechanical Engineering, August, 2005, pp 30-31 (a condensation of ?Fourier?the Father of Modern Engineering?)

Read More
  • Cover Image

Why the Fluid Friction Factor Should Beabandoned, And the Moody Chart Transformed, The Open Mechanical Engineering Journal, 2009, 3, 43-48

By: Adiutori, Eugene F.

Why the Fluid Friction Factor Should Be Abandoned, and the Moody Chart Transformed, The Open Mechanical Engineering Journal, 2009, 3, 43-48

Read More
  • Cover Image

The New Engineering

By: Eugene F. Adiutori

The first book that addressed the full scope of the new engineering. For more information visit http://thenewengineering.com

Read More
  • Cover Image

Introduction to SolidWorks : Second Edition

By: Mario H. Castro-Cedeno

In this book the author teaches how to use of SolidWorks as a tool for developing and presenting engineering ideas and concepts. In addition to teaching the basics of SolidWorks, he shares his experience related to how these tools are used in an engineering organization. Many introductory CAD tutorials focus only on the software and train students to be skilled CAD operators. This book also places equal emphasis on creating engineering drawings that comply with accepted design standards. Engineering drawings are the most important means of communication between the design and manufacturing functions. They are also necessary for the maintenance and repair of consumer and industrial product as varied as automobiles, airplanes, earth moving equipment and cruise ships. Lastly, engineering drawings are legal documents and commonly used to determine and apportion fault in product liability lawsuits. Every engineering and manufacturing professional must be proficient at creating, understanding and using engineering drawings. The second edition updates the book to the latest version of SolidWorks (2014)....

The reason for writing another “Introduction to SolidWorks” book is to emphasize the role and importance of computer aided design (CAD) and engineering drawings in communicating design ideas. The old adage “a picture is worth a thousand words” is true in mechanical engineering design. Sometimes it is impossible to describe a complex design in words and we must use engineering drawings. ...

The book is divided into the following five sections: 1. Introducing and Customizing SolidWorks 2. Modeling Simple Parts 3. Modeling Complex Parts 4. Modeling Assemblies 5. Creating Engineering Drawings...

Read More
  • Cover Image

A Little Light in the Darkness : The Life and Times of John Buddle 1773-1843

By: David Joseph Kidd

John Buddle was a local hero in North East England. When he died in 1843 his funeral procession was more than a mile long and thousands of pitmen lined the route to show their respect. He was a self made man who led his men from the front through floods, fires and explosions to get the coal Britain's industry depended upon. This book based on his unpublished diaries tells the story of his life in his own words, the drama, the tragedy, the lives of rich and poor in a way that makes history come alive....

For those on the surface that bright late spring morning, the twenty five pitmen who had escaped, others from the resting shift, and relatives of those still trapped underground the scene at the surface was terrifying. Within twenty minutes the water was sixty feet deep in the engine pit, the pit where the men were, and by the afternoon it was a hundred and twenty feet up the shaft...Buddle started pumping immediately, but the pumps at full capacity made no impression on the water which seemed to be coming from a vast underground reservoir and flowing like a subterranean river in spate. The only hope for the trapped men was to find another way into the workings. There were plenty of possibilities, but everyone knew it was a desperate gamble; old pits were death traps, a maze of half collapsed shafts and tunnels filled with gas, only madmen would want to go down them, but there was no shortage of volunteers and Buddle himself led the way....

Introduction A Day to Remember A Century of Inventions Newcastle’s Call The Steam Elephant The Battle against Creep The Deluge The Slaughterhouse The Jarrow Gibbet The Secret Diary An Arranged Marriage Seaham Harbour The Lost Main Line Politics and Personality QED Sudden Death End notes Appendix A Glossary of Mining Terms Bibliography Page References ...

Read More
  • Cover Image

Interval Neutrosophic Sets and Logic : Theory and Applications in Computing

By: Florentin Smarandache; Haibin Wang

Chapter 1 first introduces the interval neutrosophic sets which is an instance of neutrosophic sets. In this chapter, the definition of interval neutrosophic sets and set-theoretic operators are given and various properties of interval neutrosophic set are proved. Chapter 2 defines the interval neutrosophic logic based on interval neutrosophic sets including the syntax and semantics of first order interval neutrosophic propositional logic and first order interval neutrosophic predicate logic. The interval neutrosophic logic can reason and model fuzzy, incomplete and inconsistent information. In this chapter, we also design an interval neutrosophic inference system based on first order interval neutrosophic predicate logic. The interval neutrosophic inference system can be applied to decision making. Chapter 3 gives one application of interval neutrosophic sets and logic in the field of relational databases. Neutrosophic data model is the generalization of fuzzy data model and paraconsistent data model. Here, we generalize various set-theoretic and relation-theoretic operations of fuzzy data model to neutrosophic data model. Chapter ...

The neutrosophic set generalizes the above mentioned sets from philosophical point of view. From scientific or engineering point of view, the neutrosophic set and set-theoretic operators need to be specified. Otherwise, it will be difficult to apply in the real applications. In this chapter, we de_ne the set theoretic operators on an instance of neutrosophic set called Interval Neutrosophic Set (INS). We call it as “interval" because it is subclass of neutrosophic set, that is we only consider the subunitary interval of [0; 1]....

Preface iii 1 Interval Neutrosophic Sets 1 1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.2 Neutrosophic Set . . . . . . . . . . . . . . . . . . . . . . . . 4 1.3 Interval Neutrosophic Set . . . . . . . . . . . . . . . . . . . . . 6 1.4 Properties of Set-theoretic Operators . . . . . . . . . . . . . . . . . . 14 1.5 Convexity of Interval Neutrosophic Set . . . . . . . . . . . . . . . . . . 15 1.6 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . 16 1.7 Appendix . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 2 Interval Neutrosophic Logic 21 2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . 21 2.2 Interval Neutrosophic Propositional Calculus . . . . . . . . . . . . . . . 23 2.2.1 Syntax of Interval Neutrosophic Propositional Calculus . . . . . . . . . 23 2.2.2 Semantics of Interval Neutrosophic Propositional Calculus . . . . . . . . . 24 2.2.3 Proof Theory of Interval Neutrosophic Propositional Calculus . . . . . . . . 25 2.3 Interval Neutrosophic Predicate Calculus . . . . . . . . . . . . . . . . 27 2.3.1 Syntax of Interval Neutrosophic Predicate Cal...

Read More
  • Cover Image

Jumpstart to Software Quality Assurance : Volume First

By: Vishnuvarthanan Moorthy

Software Quality Assurance is a specialized activity and it contributes in building capable processes in organization. This book details the different knowledge areas and provides practical insight which is required for software quality analyst to quickly grasp and start being productive within days, and contributes to build such capable processes. This book details the basics of quality assurance, relevant techniques and methods used in quality assurance. What is in there? • A quick description of various knowledge areas in software quality assurance • Frequently used tools and techniques in Software quality assurance • Sample cases to understand the concepts Why this book? • A simple ready recknor for SQA • Mix of pragmatic and theoretical elaborations • Industry specific and current needs of Industry is taken care • Short book for quick read Who should read? • People who are interested in making a career in software quality assurance • Who are interested in understanding Quality assurance • Who are leading an organization and wants to set up the Quality assurance function ...

Audit Expectations: An audit is expected to check, does the Quality System meet the requirements of the relevant Quality System Standard/model or Contract? Does the organization do what the Quality System specifies? Is the Quality System, as implemented, effective in ensuring maintenance and improvement of the quality of products and services? Audit is not an alternative to an inspection operation and cannot serve as a crutch to an ineffective inspection or quality system Types of Audit: • First Party Audit (Internal Audits) • Second Party Audit (Customer Audits) • Third Party Audit (Audit Agencies) Horizontal and Vertical Audits: • Horizontal Audit - Assess same aspect in all projects. • Vertical Audit - Assess all aspects in one project • forward tracking • backward tracking • Hybrid Audits - Mixing Horizontal and Vertical Audits Audit Team: One or more auditors conducting an audit, supported if needed by Technical Experts. The auditors are lead by Lead Auditor. One or more auditees represent the function or the organization. Lead Auditor Responsibilities: (Second party and Third party audits) • Negotiate scope ...

Quality Fundamentals Quality Assurance Functions Lifecycle Models Project Management Configuration Management Software Estimation Risk and Issue Management Tailoring and Waivering Software Engineering - Development Service Management Reviews Metrics Core SQA Activities Quality Audits Quality Control Tools and Basic Statistics Standards (ISO 9001, 20000, 27001) and Models (CMMI, PCMM) Agile Scrum Earned Value Analysis Reference Sites ...

Read More
  • Cover Image

Get Started with Video Captioning : A Beginner's Guide to Making Video Accessible: A Beginner's Guide to Making Video Accessible

By: Patrick Joseph Besong

Have a video that you need to make accessible, but don't have a clue how to start? This book will get you up and running in no time. It will show you how in layman's language how to go about the task of closed captioning your videos, what the different formats are, what software to use, and will also go over the basic style guidelines in creating captioned videos....

Captioning video not only makes video accessible to the deaf and hard-of-hearing, but there are other compelling reasons for it as well. These are also good talking points to convince others of the need to caption video. • Captioned videos have better user retention of the video content. • The video’s transcripts are searchable, so you will get better Search Engine Optimization (SEO), which may give you a leg up on your competition. • Captioned video also opens your market reach to a whole new segment of paying customers - the deaf! • It’s the law. Many videos that are provided to the public must be captioned either due to federal communication law, or merely a company’s policy regarding accessibility. • Language learning relies heavily on captioned video. • If the viewer is in a noisy area and does not have access to headphones, the captions can be read while watching the video. • Similarly, if the viewer does not have headphones and cannot turn up the volume due to the need to keep noise to a minimum (like in a library or nursery), the captions are there to provide what is being spoken....

Preface 1. Why Caption Video? 2. Captioning Formats 3. Helpful Software 4. Captioning Style Guide Helpful Video Captioning Related Links About the Author...

Read More
  • Cover Image

Comment créer et Optimiser son profil Google+ : Pour plus de visibilité, Volume 1: Pour plus de visibilité

By: Noel NGUESSAN; Noel NGUESSAN, Editor

Le lancement du concept de Google AuthorShip apporte encore plus d’intérêt au profil Google+. Et ce, dans la mesure où il permet à Google de mettre plus en valeur et de favoriser le profil Google+ de chaque auteur identifié sur ses pages de résultats. C’est d’ailleurs ce qu’a récemment confirmé Eric Schmidt, Président du Conseil d’Administration de Google. Par conséquent, bien optimiser son profil permet de tirer avantage de cette faveur que Google compte accorder aux auteurs ayant créé un profil Google+ et l’ayant lié à tous leurs contenus. Découvrez donc dans cet eBook gratuit comment vous y prendre pour réussir l’optimisation de votre profil Google+ qui va de plus en plus influencer votre classement sur le moteur Google....

Google+ est le réseau social de Google lancé en juin 2011 et qui compterait plus de 550 millions d'utilisateurs dont 345 millions d'actifs au dernier pointage. On pourrait penser qu'avec Google+, Google essaie de concurrencer Facebook sur son propre terrain en espérant, bien sûr, prendre sa place de leader dans ce créneau. Mais, en fait, ce n'est pas vraiment la place de leader qui intéresse réellement Google. Même si cela ne lui déplairait pas d'occuper cette place. La raison principale pour laquelle Google a lancé Google+ réside surtout dans la récupération des données personnelles des internautes. Car, avoir plus de données de ses utilisateurs, c'est bien entendu pouvoir fournir des résultats personnalisés et surtout pouvoir vendre de la publicité très ciblée à chacun d'eux. Google envisage donc, avec Google+, de changer le monde de l'internet en profondeur. Et pour ce faire, il lui faut plus de données personnelles, une meilleure identification des individus et plus d'intégration de tous ses services. Google+ n'est pas encore un produit fini comme l'ont été Buzz ou Orkut. Mais, il bel et bien un projet de Goo...

Introduction Les fonctionnalités de Google+ Optimisation du profil Google+ Conseils pour plus de performances Importance du bouton Google +1 ...

Read More
  • Cover Image

Affiliate Assassin to Create Targeted Affiliate Marketing Campaigns : Affiliate Assassin, Volume 84: Affiliate Assassin

By: Jeffrey Benson

Discover how to create laser targeted affiliate marketing campaigns

you can literally start making money online in a matter of a few days, even a few hours.

INTRODUCTION TO AFFILIATE ASSASSIN 3 CHOOSING THE RIGHT PRODUCTS 4 MONEY WITH REVIEW SITES 13 CATER TO HUNGRY BUYERS 13 HOW TO MAKE MONEY WITH AN AMAZON REVIEW SITE 19 MAKING MONEY WITH CPA OFFERS 22 LIST BUILDING PROFIT PLAN 27 THE TOOLS YOU NEED 28 CREATING A HIGH CONVERTING SQUEEZE PAGE 36 INCENTIVE OFFERS: UP CLOSE 41 PROMOTING YOUR SQUEEZE PAGE FOR MAXIMUM PROFITS 42 LIST BUILDING OVERVIEW 49 QUICK AFFILIATE CASH STRATEGIES 51 DESPERATE MARKET PROFITS 55 LAUNCHING YOUR CAMPAIGNS 65 KEYWORD RESEARCH MADE EASY 66 MARKETING YOUR AFFILIATE CAMPAIGNS 72 GENERATE TRAFFIC FROM BACKLINKS 75 GENERATE TRAFFIC FROM SOCIAL MEDIA SITES 78 GENERATE TRAFFIC FROM DIRECTORIES 80 ...

Read More
  • Cover Image

Facebook Marketing Profit Masters : Learn the Most Profitable Strategies to Profit from Facebook: Learn the Most Profitable Strategies to Profit from Facebook

By: David Drummy Lewis, Mr.

***Learn proven strategies to earn passive income using Facebook. A step by step process to profit from Facebook while helping people.*** You need this training! Also i encourage you to download and share this free guide with your friends. Thank you ...

Read More
  • Cover Image

Build-to-shelve Prototyping : Undercutting Doctrinal Development

By: Lieutenant Colonel Donald “Bud” Vazquez, USAF

I submit there are two ways we can use limited numbers of prototype systems to ensure we learn relevant tactical lessons before we have to fight:(1) capitalizing on interactive computing technologies to better develop requirements and tactics throughout the system life cycle and (2) changing our concept of prototypes from the buying of one or two “experimental”items to procuring entire “prototypical” units....

1 SETTING THE STAGE . . . . 1 Background . . . . . 1 Methodology . . . . 2 Military Doctrine: Definitions and Types . . . . . 3 Notes . . . . 5 2 DEVELOPING ROBUST EMPLOYMENT DOCTRINE . . . . 7 Why Employment Doctrine Matters . . . . 7 How Employment Doctrine Develops . . . . . 8 Combat-Capable versus Combat-Lethal Doctrine . . . . . 11 Notes . . . . 13 3 DOCUMENTING DOCTRINAL LAG . . . . 15 The YB-17 and Refining Doctrine under Fire . . . . . 15 Modern Perspectives . . . . 18 Notes . . . . 21 4 CRITIQUING THE YOCKEY POLICY . . . . . 23 The Fallacy of Strategic Warning . . . . . 23 We Can’t Predict What We’ll Need . . . . . 25 Summarizing the Policy Critique . . . . . 27 Notes . . . . 27 5 POTENTIAL SOLUTIONS . . . . 29 Interactive Simulation for Employment Doctrine . . . . . 29 Prototypical Units . . . . . 32 Historical Perspective . . . . . 33 Notes . . . . 33 6 CONCLUSION . . . . 35 Notes . . . . 37 BIBLIOGRAPHY . . . . . 39...

Read More
  • Cover Image

Preventing Catastrophe : US Policy Options for Management of Nuclear Weapons in South Asia

By: Lieutenant Colonel Martin J. Wojtysiak,USAF

In Preventing Catastrophe: US Policy Options for Management of Nuclear Weapons in South Asia, Lt Col Martin J. “Marty” Wojtysiak, USAF, proposes a response to the dangerous proliferation of nuclear weapons in India and Pakistan. This paper highlights the threat in “The Nuclear Catastrophe of 2005,” a gripping projection of the worstcase scenario on the current realities of the Indian subcontinent. Written a year after the “catastrophe,” it vividly describes the events leading up to the disaster as well as the grim aftermath of a South Asian nuclear war. The remainder of the paper looks at US regional objectives and suggests how they might be achieved. The author proposes a regional proliferation regime that realistically addresses the threat and moves the United States to a pragmatic approach to manage and limit the ongoing proliferation in South Asia....

Read More
  • Cover Image

The F-22 : The Right Fighter for the Twenty-first Century?

By: Michael J. Costigan

In this study Lt Col Michael J. Costigan, USAF, takes a critical look at the F-22 and its role in our military strategy in the twenty-first century. Its innovative technologies provide the F-22 with supercruise, stealth, and integrated avionics, and enable it to guarantee the air superiority so necessary to victory....

Read More
  • Cover Image

The Influence of Politics, Technology, and Asia on the Future of US Missile Defense

By: Lt. Col. Jeffrey T. Butler, USAF

Missile defense has become a key factor in US strategic planning. The problem, of course, lies with the stage of current technological development. Mid-course or terminal-phase systems appear closer to feasibility just now, at least theoretically....

1 Introduction . . . . . . . . . . . . . . . . . . . . . . 1 Note . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3 2 Déjà vu All Over Again . . . . . . . . . . . . . . .5 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 3 Evaluation of Current National Missile-DEFENSE PROGRAMS . . . . . . . . . . . . . . . . 19 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 4 Asia and the US Missile-defense Program . . . . . . . . . . . . . . . . . . . . . . . . . 35 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . .51 5 Conclusions . . . . . . . . . . . . . . . . . . . . . 53 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . .70 ACRONYMS . . . . . . . . . . . . . . . . . . . . . . . 71 BIBLIOGRAPHY . . . . . . . . . . . . . . . . . . . . 73...

Read More
  • Cover Image

The US Response to China’s ASAT Test : An International Security Space Alliance for the Future

By: Lt Col Anthony J. Mastalir, USAF

Lt Col Anthony Mastalir has done policy makers a welcome service by exploring the enigma wrapped in a conundrum which is Chinese space policy, focusing on the Chinese kinetic energy antisatellite (KE-ASAT) test of January 2007. That test ended a de facto moratorium on KE-ASAT tests which the United States and Russia had observed for over two decades. It also announced the arrival of a new player in strategic space, forcing a reevaluation of US capabilities in space as well as Chinese intentions there. Colonel Mastalir examines both that reevaluation and those intentions, relying on open-source material, particularly from Chinese strategic and military analysts....

1 INTRODUCTION . . . . . . . . . . . . . . . . . . . 1 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . .11 2 EXTREME DIMENSIONS . . . . . . . . . . . . . . 15 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . .22 3 POLITICAL/DIPLOMATIC DIMENSION . . . . 25 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . 42 4 INFORMATION DIMENSION . . . . . . . . . . . 47 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . .59 5 ECONOMIC DIMENSION . . . . . . . . . . . . . 61 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . .71 6 MILITARY DIMENSION . . . . . . . . . . . . . .75 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . .86 7 FINDINGS/CONCLUSION . . . . . . . . . . . . .89 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . 98 ABBREVIATIONS . . . . . . . . . . . . . . . . . . . 101 BIBLIOGRAPHY . . . . . . . . . . . . . . . . . . . .103...

Read More
  • Cover Image

GPS Versus Galileo : Balancing for Position in Space

By: Scott W. Beidleman

This study investigates Europe’s motives to develop the independent satellite navigation system known as Galileo despite the existence of America’s successful global positioning system (GPS). The study begins by analyzing both systems to familiarize the reader with global navigation satellite systems (GNSS) and to provide an understanding of the strengths and weaknesses of GPS and Galileo, as well as the systems’ similarities and differences. Although the two systems have different founding principles, they employ similar infrastructures and operational concepts. In the short term, Galileo will provide better accuracy for civilian users until GPS upgrades take effect. But performance is only part of the rationale. The author contends that Europe’s pursuit of Galileo is driven by a combination of reasons, including performance, independence, and economic incentive. With Galileo, Europe hopes to achieve political, security, and technological independence from the United States....

DISCLAIMER . . . . . . . . . . . . . . . . . . . . . . .ii FOREWORD . . . . . . . . . . . . . . . . . . . . . . .vii ABOUT THE AUTHOR . . . . . . . . . . . . . . . . .ix ACKNOWLEDGMENTS . . . . . . . . . . . . . . . . .xi 1 INTRODUCTION . . . . . . . . . . . . . . . . . . . 1 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 2 GPS VERSUS GALILEO . . . . . . . . . . . . . . .11 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . .27 3 WHY GALILEO? . . . . . . . . . . . . . . . . . . .31 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . .45 4 IMPLICATIONS AND RECOMMENDATIONS . .51 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . 66 ABBREVIATIONS . . . . . . . . . . . . . . . . . . . .69 BIBLIOGRAPHY . . . . . . . . . . . . . . . . . . . . 71 Illustrations 1 Satellite geometry 9 2 Global positioning system (GPS) satellite 14 3 Galileo satellite 16 Table 1 Number of visible satellites for various masking angles . . . . . . . . . . . . . . . . . . . .13...

Read More
  • Cover Image

Trendsiters Digital Content and Web Technologies

By: Sam Vaknin

Essays dedicated to the new media, doing business on the web, digital content, its creation and distribution, e-publishing, e-books, digital reference, DRM technology, and other related issues....

Read More
  • Cover Image

A New and Simple Concept for the Analysis of Nonlinear Heat Transfer Phenomena Such as Boiling, British Chemical Engineering, Dec 1965, Pp 840-845

By: Adiutori, Eugene F.

A New and Simple Concept for the Analysis of Nonlinear Heat Transfer Phenomena Such as Boiling, British Chemical Engineering, Dec 1965, pp 840-845

Read More
  • Cover Image

A Critical Examination of the View That Nucleate Boiling Heat Transfer Data Exhibit Power Law Behavior, Japanese Society of Mechanical Engineers International Journal, Series B, Vol. 37, No. 2, 1994, Pp 394-402

By: Eugene F. Adiutori

A Critical Examination of the View that Nucleate Boiling Heat Transfer Data Exhibit Power Law Behavior, Japanese Society of Mechanical Engineers International Journal, Series B, Vol. 37, No. 2, 1994, pp 394-402...

Read More
  • Cover Image

AFDDEC Research Paper 2007-2, The Airpower Advantage in Future Warfare : The Need for Strategy

By: Colin S Gray

Technical innovation lies at the heart of the case for privileging airpower in the American way of war, but such innovation comprises only one of warfare’s seven vital contexts. The sheer complexity of war and warfare renders prediction, technological and other, a high-risk activity. The contexts of war and warfare are (1) political, (2) societal-cultural, (3)economic, (4) technological, (5) military-strategic, (6) geographical, and (7) historical....

DISCLAIMER . . . . . . . . . . . . . . . . . . . . . . .ii ABOUT THE AUTHOR . . . . . . . . . . . . . . . . .v SUMMARY . . . . . . . . . . . . . . . . . . . . . . . .vii THE AIRPOWER ADVANTAGE IN FUTURE WARFARE: THE NEED FOR STRATEGY . . . . . . .1 Plan of Attack . . . . . . . . . . . . . . . . . . . . . .3 Why this Study? . . . . . . . . . . . . . . . . . . . . 3 Airpower Theory . . . . . . . . . . . . . . . . . . . 8 Issues and Arguments . . . . . . . . . . . . . . .13 Future Warfare: Contextual Realities . . . . . 20 US Airpower Advantage in Future Warfare . . 30 NOTES . . . . . . . . . . . . . . . . . . . . . . . . . . 35...

Read More
  • Cover Image

The Public Domain : Enclosing the Commons of the Mind

By: James Boyle

Our music, our culture, our science, and our economic welfare all depend on a delicate balance between those ideas that are controlled and those that are free, between intellectual property and the public domain. In The Public Domain: Enclosing the Commons of the Mind (Yale University Press) James Boyle introduces readers to the idea of the public domain and describes how it is being tragically eroded by our current copyright, patent, and trademark laws. In a series of fascinating case studies, Boyle explains why gene sequences, basic business ideas and pairs of musical notes are now owned, why jazz might be illegal if it were invented today, why most of 20th century culture is legally unavailable to us, and why today's policies would probably have smothered the World Wide Web at its inception. Appropriately given its theme, the book will be sold commercially but also made available online for free under a Creative Commons license.(1.6MB PDF File) ...

Read More
  • Cover Image

CMMI Implementation Guide : A Practitioner's Persepective

By: Vishnuvarthanan Moorthy

The Book details on how to approach CMMI Implementation in an organization. It details out the various phases involved in CMMI Implementation and how to plan and execute them. It details on various aspects which we tend to overlook in CMMI Implementation. Who Should Read? • Organization looking forward to implement CMMI • Top Management person, trying to understand how to go about • SEPG, Program manager and Process Quality members • Anyone who is interested in understanding the Implementation of CMMI Why to Read? • To get complete End to End understanding on CMMI Implementation Lifecycle • Plan your budget, effort and resources for the program • Set your expectations clear on CMMI Implementation • Be aware of the different aspects in Implementation How it’s different: • Written from practitioners’ point of view • Communicates the reality in practical implementation Word of Caution: • The book contains only samples and typical examples and they are not comprehensive and to be verified and validated on a particular context for applicability ...

This CMMI Implementation Guide is a reference book for anyone interested in implementing CMMI in their organization. The purpose of this book is, to provide insight in to CMMI Implementation phases and best practices to be followed in this journey. Most of us agree, that CMMI is more a De facto model that IT Industry follows and other industries also has shown lot of interest in adopting this model. The day to day popularity and its adoption rate is on the surge for CMMI. In this scenario, this book will help the new organizations and implementers, on how to approach CMMI Implementation practically in their organization. This book is not a replacement to the Model or to the resources which CMMI Institute Publishes. This is only an additional resource which user can benefit from. CMMI Institute holds the complete authority and rights to CMMI model and all the components within the framework. This book is prepared based on the experience of a practitioner on implementing the model in various organizations. The Author has worked in multiple roles in CMMI Implementation and has global exposure in implementing the model. We reiterate ...

Contents Introduction to CMMI Initiating CMMI Implementation Planning CMMI Implementation Executing CMMI Implementation Appraising CMMI Implementation Sustaining CMMI Implementation CMMI High Maturity Implementation Miscellaneous References ...

Read More
       
1
|
2
|
3
Records: 21 - 40 of 47 - Pages: 
 
 





Copyright © World Library Foundation. All rights reserved. eBooks from Project Gutenberg are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.