Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Creating Cool MINDSTORMS NXT Robots (Technology in Action)

Buy
Build and program MINDSTORM NXT robots with Daniele Benedettelli, one of the world’s most respected NXT robot builders. He shows you how to build and program them from scratch, starting with the simplest robots and progressing in difficulty to a total of seven award–winning robots! You can download all the code, along with low–resolution videos that show how your robot works when it’s finished. You don’t need to be a programmer to develop these cool robots because all the code is provided, but advanced developers will enjoy seeing the secrets of Benedettelli’s code and techniques revealed.

What you’ll learn

  • How to create award–winning robots from scratch to final programming.
  • How to build each robot and which materials to use.
  • Why certain features have specific designs.
  • How to program your robot–all code is available for free download.
  • Inspiration and tips and tricks on robotics, a particularly valuable resource for teachers and students.

Who is this book for?

Anyone interested in building robots or seeing how it is done. Programmers interested in learning how robots are programmed.

About the Author

A biography for this author is not available.
(HTML tags aren't allowed.)

Building Secure Servers with Linux
Building Secure Servers with Linux
Linux consistently turns up high in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services like DNS and routing mail. But security is uppermost on the mind of anyone providing such a service. Any server experiences casual probe attempts dozens of time a day, and serious break-in attempts with some...
Immunological Computation: Theory and Applications
Immunological Computation: Theory and Applications
Over the last decade, the field of immunological computation has progressed slowly and steadily as a branch of computational intelligence. Immunological Computation: Theory and Applications presents up-to-date immunity-based computational techniques. After a brief review of fundamental immunology concepts, the book presents computational models...
The Courageous Follower: Standing Up to and for Our Leaders (2nd Edition)
The Courageous Follower: Standing Up to and for Our Leaders (2nd Edition)

This updated edition of a modern classic on followership provides the keys to creating an environment in which leaders are vigorously supported in pursuing the organization’s mission and courageously confronted when their actions threaten the organization’s well-being.

For every leader there are dozens of followers who work...


Variation-Aware Adaptive Voltage Scaling for Digital CMOS Circuits (Springer Series in Advanced Microelectronics)
Variation-Aware Adaptive Voltage Scaling for Digital CMOS Circuits (Springer Series in Advanced Microelectronics)

Increasing performance demands in integrated circuits, together with limited energy budgets, force IC designers to find new ways of saving power. One innovative way is the presented adaptive voltage scaling scheme, which tunes the supply voltage according to the present process, voltage and temperature variations as well as aging. The voltage...

Business Process Implementation for IT Professionals and Managers
Business Process Implementation for IT Professionals and Managers

The King is dead; long live the King! That famous cry sums up most aspects of modern business practice. The previously existing competitive environment, scope, internal structures, and automation support needs of an enterprise have disappeared and been replaced by other sets of conditions and requirements. In time, those needs, too, will...

Linux Security: Craig Hunt Linux Library
Linux Security: Craig Hunt Linux Library
Authoritative Answers to All Your Linux Security Questions—Specifically for Linux Administrators

This is the most complete, most advanced guide to Linux security you’ll find anywhere. Written by a Linux security expert with over a decade of experience, Linux Security teaches you, step-by-step, all the...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy