Python is an interpreted high-level programming language for general-purpose programming. Python has a design philosophy that emphasizes code readability, notably using significant whitespace. It p...więcej »
This book is an effort to embolden Nyerere's rich idea on human dignity which, in my view, is hardly acknowledged, most probably, because it is dispersed into other related ideas of freedom, unity,...więcej »
This book is an introduction to Scientific Calculus. Its aim is to present numerical methods for solving mathematical problems with a computer that cannot be dealt with simply with a sheet of paper...więcej »
Nullement comme au temps d'alors dans l'histoire, on n'a probablement écrit autant de traités et de tentatives, produite autant de théories et d'analyses sur la culture et l'altérité. Ce qui est d'...więcej »
Transport Planning and Engineering is a approved elective course of Purbanchal University, Nepal. The course contents the urban transport panning process, airport engineering, railway engineering a...więcej »
The aim of this study was to determine the relationship between metacognitive beliefs and thought control strategies with test anxiety: the mediating role of perfectionism in gifted male and female...więcej »
This book covers various details regarding heat transfer like basic concepts of heat transfer, steady state heat conduction, heat transfer from extended surfaces, transient heat conduction, radiati...więcej »
The health sector is a very important sector for the public service. While the health of the population remains the State's priority, a computer scientist researcher is interested in the quality of...więcej »
The data transmission owes its existence to the need to transmit data at greater or lesser distances over wire lines that are often sensitive to interference. The raison d'etre of any data transmis...więcej »
Industrial development has brought about the emergence of new processes and the necessary optimization of existing ones in order to achieve high quality products, using advanced technologies that r...więcej »
This book is the first footprint in the research world of Vehicles as in Today's world the Vehicle security and Safety is most important. Now a days driving on highways becomes crucial when multipl...więcej »
The use of ontologies for data representation is a broad research line within artificial intelligence. Ontologies are used to represent knowledge so that it can be interpreted by computer systems. ...więcej »
Nowadays, data security is playing a significant role in the communication system as the hackers between transmissions media are more. The level of security depends on the secret key according to t...więcej »
This book is a combination of primary and secondary data procured from time to time. The duration of completion of this book is almost two years. The author is not responsible if some the data does...więcej »
This book aims to be a first field guide of small gastropod shells that were recorded in Thailand, including marine, freshwater and terrestrial group. The book demonstrates color photos, common nam...więcej »
The theme of this book: cross-cultural, marriage, poverty, war, death, history, these theme are very troublesome, but unfortunately we are all in them, they are confused in people's perception, clo...więcej »
As a result of this study it is expected an improvement in the use of microcontroller resources and/or the way programmers interact with the reality of industrial control processes. Although this i...więcej »
Innovations make life beautiful! It has made living to become more interesting than ever, Bill Gates would never had believed microsoft would change the world, but yearly innovative practice help t...więcej »
Fahredin Shehu's Aromatic Memories(Ormus by Fahredin Shehu) ...A metempsychotic encounter with the like-minded, an encounter taken as pure faith, as an outburst of the sacral. A memory led by the i...więcej »
The increasing use of the Internet by the users in their daily routines highlights the great success of the Internet. The need for secure data transmission has become very essential. Attacks by hac...więcej »