Book picks similar to
Power Electronics for Technology by Ashfaq Ahmed


power
electronics
engineering-books
electronics-power

Semiconductor Device Fundamentals


Robert F. Pierret - 1995
    Problems are designed to progressively enhance MATLAB-use proficiency, so students need not be familiar with MATLAB at the start of your course. Program scripts that are answers to exercises in the text are available at no charge in electronic form (see Teaching Resources below). *Supplement and Review Mini-Chapters after each of the text's three parts contain an extensive review list of terms, test-like problem sets with answers, and detailed suggestions on supplemental reading to reinforce students' learning and help them prepare for exams. *Read-Only Chapters, strategically placed to provide a change of pace during the course, provide informative, yet enjoyable reading for students. *Measurement Details and Results samples offer students a realistic perspective on the seldom-perfect nature of device characteristics, contrary to the way they are often represented in introductory texts. Content Highlig

Electrical Machines, Drives, and Power Systems


Theodore Wildi - 2001
    The scope of the book reflects the changes that have occurred in power technology, allowing the entrance of power electronics into every facet of industrial drives, and expanding the field to open more career opportunities.

Electronic Devices and Circuits


J.B. Gupta
    Electronic circuits consist of inductors, diodes, resistors, capacitors and transistors. They are then connected through wires to ensure that electric current flows. Complex operations like computations, data transfer and amplification of signals can be then effectively performed. The book informs readers about the types of circuits, which can be analog, digital or a combination. A novice student needs to understand and comprehend the workings of the electronic device. This book, with the aid, of examples, concise definitions, clear methodologies, graphics and maps shows readers how easy this subject is to comprehend. The book starts from the basics, by first showing the connection of electronic instrumentation and physics. It continues by explaining in detail what semi conductor mechanisms and circuits do. Readers learn how the contact of two semi conductors or bipolar junction transistors work. One needs to figure the mechanisms of field effect transistors that carry out the single operation of transmitting electrical charge, from the source to the sap. Various power apparatuses, logic gate, boolean algebra and the cathode ray oscilloscope are some topics that have been discussed and explained in the book. Electronic devices and circuits presents a series of questions and answers that serve as key aids to college students too. Evaluation questions, unanswered problems and intentional questions are there to challenge the reader further. Each chapter picks on a specific part of electronic devices and suitably explains it workings and critical concepts. The reprint 2013 edition of this book was published by s k kataria and sons, as a paperback in 2013. Key features: this book is useful for electrical, computer and instrumentation engineering students.

Fluid Mechanics with Engineering Applications


E. John Finnemore - 1985
    This book is for civil engineers that teach fluid mechanics both within their discipline and as a service course to mechanical engineering students. As with all previous editions this 10th edition is extraordinarily accurate, and its coverage of open channel flow and transport is superior. There is a broader coverage of all topics in this edition of Fluid Mechanics with Engineering Applications. Furthermore, this edition has numerous computer-related problems that can be solved in Matlab and Mathcad.

The King of Fire


Brittany White - 2019
    She worked at a rock-climbing studio before quitting her job to go on an adventure in Tokyo. June went to visit her sister, Samantha, hoping Sam would agree to go on the expedition with her, but because it involves a semi-active volcano, Samantha refused to go with June. June decided to go on the trip anyway, much to her sister’s disappointment. Once she got there, an accident proved that Samantha might have been right after all. Mishal, the King of Fire, had been trapped for well over a century with the Royal Guardians. He hoped for their freedom as activity started within the volcano. Just when he was sure they were going to remain inside; a human girl fell through the barrier. Faced with the decision to show himself or let her die, Mishal decided the girl’s life was worth more than his secret and he shifted into his dragon form to save her. As he carried her to the safety of a local hospital, he decided that she was to be his mate no matter how long it took him to woo her. June wants to stay and learn about the man who saved her life. He had a secret. As she spent time with Mishal, she realized she was developing feelings for him, secret or not. He finally told her, and she was in complete shock but still had feelings for him she could not deny. June tried to dismiss her feelings by returning home to the states, but soon found out Sam betrayed her trust and now Mishal and his people are in danger. June must race against the clock to save Mishal and his people. Will June succeed? Will love prevail? Note: Adults Only!

Solutions of Selected Problems for Mathematical Methods in the Physical


Mary L. Boas - 1984
    Intuition and computational abilities are stressed. Original material on DE and multiple integrals has been expanded.

Fundamentals of Computer Algorithms


Ellis Horowitz - 1978
    The book comprises chapters on elementary data structures, dynamic programming, backtracking, algebraic problems, lower bound theory, pram algorithms, mesh algorithms, and hypercube algorithms. In addition, the book consists of several real-world examples to understand the concepts better. This book is indispensable for computer engineers preparing for competitive examinations like GATE and IES.

Student Solutions Guide For Discrete Mathematics And Its Applications


Kenneth H. Rosen - 1988
    These themes include mathematical reasoning, combinatorial analysis, discrete structures, algorithmic thinking, and enhanced problem-solving skills through modeling. Its intent is to demonstrate the relevance and practicality of discrete mathematics to all students. The Fifth Edition includes a more thorough and linear presentation of logic, proof types and proof writing, and mathematical reasoning. This enhanced coverage will provide students with a solid understanding of the material as it relates to their immediate field of study and other relevant subjects. The inclusion of applications and examples to key topics has been significantly addressed to add clarity to every subject. True to the Fourth Edition, the text-specific web site supplements the subject matter in meaningful ways, offering additional material for students and instructors. Discrete math is an active subject with new discoveries made every year. The continual growth and updates to the web site reflect the active nature of the topics being discussed. The book is appropriate for a one- or two-term introductory discrete mathematics course to be taken by students in a wide variety of majors, including computer science, mathematics, and engineering. College Algebra is the only explicit prerequisite.

The Guardian


Nikki Landis - 2016
    Each book builds upon the previous and increases the romantic involvement between the characters.

Hacking: The Art of Exploitation


Jon Erickson - 2003
    This book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.

Eleventh Hour CISSP®: Study Guide


Eric Conrad - 2016
    This book is streamlined to include only core certification information, and is presented for ease of last-minute studying. Main objectives of the exam are covered concisely with key concepts highlighted. The CISSP certification is the most prestigious, globally-recognized, vendor neutral exam for information security professionals. Over 100,000 professionals are certified worldwide, with many more joining their ranks. This new third edition is aligned to cover all of the material in the most current version of the exam’s Common Body of Knowledge. All domains are covered as completely and concisely as possible, giving users the best possible chance of acing the exam. Completely updated for the most current version of the exam’s Common Body of Knowledge Provides the only guide you need for last-minute studying Answers the toughest questions and highlights core topics Streamlined for maximum efficiency of study, making it ideal for professionals updating their certification or for those taking the test for the first time

The 8051 Microcontroller And Embedded Systems: Using Assembly And C


Muhammad Ali Mazidi - 2008
    The first uses high-performance microprocessors while in the second category, issues of space, power and rapid development are more critical. Intended for those with no background as well as those with prior Assembly language experience, this book looks at Assembly language programming.

The 3D Printing Handbook: Technologies, design and applications


Ben Redwood - 2017
     The 3D Printing Handbook provides practical advice on selecting the right technology and how-to design for 3D printing, based upon first-hand experience from the industry’s leading experts. In this book: The mechanisms behind all major 3D printing technologies The benefits and limitations of each technology Decision making tools for technology selection Actionable design advice and guidelines Industry case studies from world-leading brands

Social Engineering: The Art of Human Hacking


Christopher Hadnagy - 2010
    Mitnick claims that this socialengineering tactic was the single-most effective method in hisarsenal. This indispensable book examines a variety of maneuversthat are aimed at deceiving unsuspecting victims, while it alsoaddresses ways to prevent social engineering threats.Examines social engineering, the science of influencing atarget to perform a desired task or divulge informationArms you with invaluable information about the many methods oftrickery that hackers use in order to gather information with theintent of executing identity theft, fraud, or gaining computersystem accessReveals vital steps for preventing social engineeringthreatsSocial Engineering: The Art of Human Hacking does itspart to prepare you against nefarious hackers--now you can doyour part by putting to good use the critical information withinits pages.

iPad: The Missing Manual


J.D. Biersdorfer - 2010
    That’s where this full-color Missing Manual comes in. Learn how to stream HD video, make video calls, manage your email, surf the Web, listen to music, play games, and maybe even do a little iWork. This is the book that should have been in the box.Build your media library. Fill your iPad with music, movies, TV shows, eBooks, photos, and more.Share with others. Stream music, HD movies, TV shows, and more, to and from your iPad.Create your own media. Use the iPad’s new Photo Booth, iMovie, and GarageBand apps to express yourself.Get online. Connect through WiFi or Wi-Fi+3G, and surf with the iPad’s faster browser.Place video calls. See who’s talking with the iPad’s FaceTime app and its two cameras.Consolidate your email. Read and send messages from any of your accounts.Learn undocumented tips and tricks. Get the lowdown on cool iPad secrets and workarounds.