Xem 1-20 trên 63 kết quả Architecture specialized
  • Enter the world of the stylish Japanese house, where every object in sight is a work of art. Japan Style introduces 20 special residences. With more than 200 color photographs, this book showcases the stunning beauty of old homes, and reveals how they are cared for by their owners. Traditional Japanese homes, with superbly crafted fine wood, great workmanship and seasonal interior arrangements, have an aesthetic of infinite simplicity. Unlike Japanese inns and historical buildings, the houses featured in this book are private property and are not open to public viewing.

    pdf228p kennybibo 14-07-2012 132 71   Download

  • The aim of this work has been to sketch the various periods and styles of architecture with the broadest possible strokes, and to mention, with such brief characterization as seemed permissible or necessary, the most important works of each period or style. Extreme condensation in presenting the leading facts of architectural history has been necessary, and much that would rightly claim place in a larger work has been omitted here. The danger was felt to be rather in the direction of too much detail than of too little. While the book is intended primarily to meet the special requirements...

    pdf25p window1234 20-12-2012 33 6   Download

  • Starting from the assumption that machine translation (MT) should be based on theoretically s o u n d grounds, we argue that, given the state of the a r t , the only v i a b l e solution for the designer of software tools for MT, is to provide the linguists building the MT system with a generator of highly specialized, problem oriented systems. We propose that such theory sensitive systems be generated automatically by supplying a set of definitions to a kernel software, of which we give an informal description in the paper. We give...

    pdf10p bungio_1 03-05-2013 22 2   Download

  • Among the metal-persons of Phobos, robot B-12 held a special niche. He might not have been stronger, larger, faster than some … but he could be devious … and more important, he was that junkyard planetoid’s only moonshiner. I AM B-12, a metal person. If you read Day and the other progressive journals you will know that in some quarters of the galaxy there is considerable prejudice directed against us. It is ever so with minority races, and I do not complain. I merely make this statement so that you will understand about the alarm clock. An alarm clock...

    pdf21p inside33 07-12-2012 13 1   Download

  • GSM (Global System for Mobile Communications, originally Groupe Spécial Mobile), is a standard set developed by the European Telecommunications Standards Institute (ETSI) to describe technologies for second generation (2G) digital cellular networks. Developed as a replacement for first generation (1G) analog cellular networks, the GSM standard originally described a digital, circuit switched network optimized for full duplex voice telephony.

    pdf178p zicokim 19-03-2010 287 202   Download

  • The dashboard is a special palette that displays buttons and controls that are associated with a task-based works and it is used primarily for 3D modeling, viewing, and rendering. The dashboard provides a single interface elem for modeling and rendering operations. It eliminates the need to display many toolbars and reduces the clutter application window. Thus, you can maximize the area available for 3D work, and use a single interface for speed convenience. The dashboard is organized into a series of control panels.

    pdf0p phongthinh 20-07-2009 615 160   Download

  • Asymmetric Digtal Subscriber Line (ADSL) use is one of the general Digital Subscriber Line (xDSL) techniques. While it has been around in the laboratory for about ten years, this particular technique has since shifted to the special evaluation site to the beginnings of consumer access. By the time this book is available, some mass provision of ADSL to the general consumer market will be available.

    pdf312p daokim 10-08-2009 204 58   Download

  • The role of emotions HRI is also an important research area so that human and robot can follow stand each other's emotional expression. Development of appropriate control architecture facilitate flexible human-machine communication and cooperation cooperation is essential for HRI. A control architecture proposed basis for the interaction and coat drive a sensor research and development, the communication modes and protocols, and system development. In addition, a majority of HRI research related to the application and learn lessons from the man-machine applications....

    pdf915p lulanphuong 24-03-2012 55 23   Download

  • The study was conducted at the University of Technology, Sydney (UTS). In 2009, 46% of the students were born outside of Australia, approximately 30% were from a non-English speaking background, and 21% were enrolled as international students. In 2009, the faculties with the largest concentrations of international students were Business (34%) and Engineering and Information Technology (29%).

    pdf125p dambaotaikhoan 04-05-2013 42 22   Download

  • ACKNOWLEDGEMENTS It is one thing to think that you know a subject but quite another to confidently write it down, secure in the knowledge that no one will challenge you later. I definitely fall into the former category. I assert that there are no experts in completion design, but there are experts in specialities within completion design. It is to many of these experts that I have turned for guidance and verification.

    pdf711p letung167 02-04-2013 86 19   Download

  • .Representing Landscape Architecture It has been said that we can realize only what we can imagine; but to realize what we imagine, we must convey those ideas to others as well as present them to ourselves. We use images, models, and words—alone or in combination—to conceive, study, test, construct, and evaluate new landscapes or modify old ones. Given the transient nature of most landscapes—always growing, always changing— landscape representation presents a special challenge. It is by no means neutral in a political sense or even in terms of design evaluation.

    pdf241p bimap_5 26-12-2012 48 16   Download

  • External influences shall be taken into account when choosing: b The appropriate measures to ensure the safety of persons (in particular in special locations or electrical installations) b The characteristics of electrical equipment, such as degree of protection (IP), mechanical withstand (IK), etc.

    pdf5p manhdinh2407 20-05-2010 58 13   Download

  • This is an easy-to-use course for students specializing in computing and information technology. All four language skills are consolidated and developed through a variety of authentic, and visual materials related to the topic. The Teacher's Guide provides teaching objectives, notes, and an answer key, tapescript and photocopiable progress tests. This book is divided into 2 parts, the following is part 1, inviting you to refer.

    pdf115p nganga_09 22-10-2015 36 12   Download

  • Database management has evolved from a specialized computer application to a central component of a modern computing environment, and, as a result, knowl- edge about database systems has become an essential part of an education in com- puter science. In this text, we present the fundamental concepts of database manage- ment. These concepts include aspects of database design, database languages, and database-system implementation.

    pdf917p animorphs 18-03-2013 30 9   Download

  • Photogrammetry from aerial platforms has been recognized since the 20th century as an important technique to map aerial grades, cities and regions. The modalities known as terrestrial and short distance have also been used, although in lesser proportion, in architecture, to survey historical buildings and monuments.

    pdf146p bi_bi1 09-07-2012 36 6   Download

  • In computer security and programming, a buffer overflow, or buffer overrun, is an anomaly where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory. This is a special case of violation of memory safety.

    pdf0p doilan 25-01-2013 26 4   Download

  • We have implemented various inner loop algorithms, and have evaluated their performance on a Pentium 4 machine. The Pentium 4 has a SIMD instruction set that supports SIMD operations using up to 128-bit registers. Other ar- chitectures have similar SIMD instruction sets that support processing of several data elements in parallel, and the tech- niques presented here are applicable to those architectures too.

    pdf7p yasuyidol 02-04-2013 14 4   Download

  • ummary This chapter focused on the key SigTran protocols and their role in a nextgeneration architecture of voice products. The SigTran work grew from a desire to decompose a traditional circuit switch into specialized components. It focused on the following two areas

    pdf8p chabongthitga 25-09-2010 37 3   Download

  • Abstract This chapter introduces the state-of-the-art in the main topics covered in the book: energy harvesting, with special interest in the body energy harvesting sources, biosensors, and finally the electronics for them. These are the main aspects to consider in the envisaged conception of the Self-Powered architecture for subcutaneous detector device.

    pdf176p maket1311 16-10-2012 17 3   Download

  • There is a large, complex and dynamic set of linkages between agriculture and water. Irrigated agriculture makes a substantial contribution to the growth in agricultural production across many countries. Yet, agriculture can have significant impacts (both positive and negative) on water ecosystems, and both agriculture and water are becoming increasingly vulnerable to climate change. In most OECD countries, agriculture is the major consumer of water and a significant source of diffuse water pollution.

    pdf214p lulaula 25-10-2012 21 3   Download

Đồng bộ tài khoản