This book aims to retrace the great epistemological currents starting with the architectonics of pure reason of Emmanuel KANT, whom we consider the greatest philosopher of science and/or a great ep...więcej »
This book focuses on finding a way to sustain or enhance the learners' motivation during the learning process within a Web-Based Intelligent Tutoring System (WITS) environment. Studies showed that ...więcej »
The human soul is Spirit, not created out of nothing, and not different from the essence of God; at the level of substratum of existence both the human soul and God are identical. (2.1.11)Due to da...więcej »
The evaluation of the simple compressive strength of concrete from samples at different heights in Puno is of great importance because the strength is a function of temperature. Low environmental t...więcej »
Applied research is necessary for progress and not to lag behind and not to stagnate in the fields of technology, industry, agriculture, medicine, culture and politics. In the meantime, any governm...więcej »
The study explains the properties of nanotubes in the wider context of materials science and highlights the contribution of research in this rapidly expanding field. A deeper understanding of the r...więcej »
In this book, open flame synthesis has been selected as a method to study the thermodynamic chemical combustion aspect of the formation and growth mechanisms of soot obtained from two domestic fuel...więcej »
Python is an interpreted high-level programming language for general-purpose programming. Python has a design philosophy that emphasizes code readability, notably using significant whitespace. It p...więcej »
This book is an effort to embolden Nyerere's rich idea on human dignity which, in my view, is hardly acknowledged, most probably, because it is dispersed into other related ideas of freedom, unity,...więcej »
This book is an introduction to Scientific Calculus. Its aim is to present numerical methods for solving mathematical problems with a computer that cannot be dealt with simply with a sheet of paper...więcej »
Nullement comme au temps d'alors dans l'histoire, on n'a probablement écrit autant de traités et de tentatives, produite autant de théories et d'analyses sur la culture et l'altérité. Ce qui est d'...więcej »
Transport Planning and Engineering is a approved elective course of Purbanchal University, Nepal. The course contents the urban transport panning process, airport engineering, railway engineering a...więcej »
The aim of this study was to determine the relationship between metacognitive beliefs and thought control strategies with test anxiety: the mediating role of perfectionism in gifted male and female...więcej »
This book covers various details regarding heat transfer like basic concepts of heat transfer, steady state heat conduction, heat transfer from extended surfaces, transient heat conduction, radiati...więcej »
The health sector is a very important sector for the public service. While the health of the population remains the State's priority, a computer scientist researcher is interested in the quality of...więcej »
The data transmission owes its existence to the need to transmit data at greater or lesser distances over wire lines that are often sensitive to interference. The raison d'etre of any data transmis...więcej »
Industrial development has brought about the emergence of new processes and the necessary optimization of existing ones in order to achieve high quality products, using advanced technologies that r...więcej »
This book is the first footprint in the research world of Vehicles as in Today's world the Vehicle security and Safety is most important. Now a days driving on highways becomes crucial when multipl...więcej »
The use of ontologies for data representation is a broad research line within artificial intelligence. Ontologies are used to represent knowledge so that it can be interpreted by computer systems. ...więcej »
Nowadays, data security is playing a significant role in the communication system as the hackers between transmissions media are more. The level of security depends on the secret key according to t...więcej »