The health sector is a very important sector for the public service. While the health of the population remains the State's priority, a computer scientist researcher is interested in the quality of...więcej »
The data transmission owes its existence to the need to transmit data at greater or lesser distances over wire lines that are often sensitive to interference. The raison d'etre of any data transmis...więcej »
Industrial development has brought about the emergence of new processes and the necessary optimization of existing ones in order to achieve high quality products, using advanced technologies that r...więcej »
Climate change and energy security have emerged as the biggest concerns of the present century. Renewables cannot save the planet alone. Nuclear power is not a silver bullet, but it is a partial so...więcej »
This book is the first footprint in the research world of Vehicles as in Today's world the Vehicle security and Safety is most important. Now a days driving on highways becomes crucial when multipl...więcej »
During the last quarter of the 2nd century BC, life in Western and Central Europe was profoundly disrupted by a major migratory process, with far-reaching consequences. Today, the confrontation of ...więcej »
The use of ontologies for data representation is a broad research line within artificial intelligence. Ontologies are used to represent knowledge so that it can be interpreted by computer systems. ...więcej »
Nowadays, data security is playing a significant role in the communication system as the hackers between transmissions media are more. The level of security depends on the secret key according to t...więcej »
One of the latest advancements in concrete technology is Ultra-High Strength Concrete (UHSC). UHSC is defined as concretes attaining compressive strength exceeding (100MPa). This concrete is a fibe...więcej »
This book is a combination of primary and secondary data procured from time to time. The duration of completion of this book is almost two years. The author is not responsible if some the data does...więcej »
This book aims to be a first field guide of small gastropod shells that were recorded in Thailand, including marine, freshwater and terrestrial group. The book demonstrates color photos, common nam...więcej »
The theme of this book: cross-cultural, marriage, poverty, war, death, history, these theme are very troublesome, but unfortunately we are all in them, they are confused in people's perception, clo...więcej »
Simulation and analysis of the projectile impact and penetration problem and its effects are among the practical topics that can be used to design bulletproof panel and military equipment, construc...więcej »
As a result of this study it is expected an improvement in the use of microcontroller resources and/or the way programmers interact with the reality of industrial control processes. Although this i...więcej »
Innovations make life beautiful! It has made living to become more interesting than ever, Bill Gates would never had believed microsoft would change the world, but yearly innovative practice help t...więcej »
Fahredin Shehu's Aromatic Memories(Ormus by Fahredin Shehu) ...A metempsychotic encounter with the like-minded, an encounter taken as pure faith, as an outburst of the sacral. A memory led by the i...więcej »
The increasing use of the Internet by the users in their daily routines highlights the great success of the Internet. The need for secure data transmission has become very essential. Attacks by hac...więcej »
The research consists of providing a business intelligence solution, in a financial institution, whose purpose of the implementation of the solution is to contribute in the process of making approp...więcej »
The following applied project is focused on the improvement of the processes of processes of brass and automotive painting in the workshop Brujo Cars located in the north of Bogota. The problem tha...więcej »
Anomaly detection using Density Maximization Fuzzy C-means Algorithm: The rationale for the anomaly detection system using density maximization approach to the fuzzy c-means clustering algorithm. T...więcej »