Nowadays, data security is playing a significant role in the communication system as the hackers between transmissions media are more. The level of security depends on the secret key according to t...
Internal combustion engine consists of different systems for the efficient working. S.I. and C.I. engines are the basic types of I.C. engines. This book article comprises of the parts and the basic...
Personality ?f ? human being i? the mo?t tedious fa?tor to elaborate as each and every person may have different personality. The personality is useful in defining uniqueness of an individual. Ever...
This book includes the details about Natural fibres and its forms, Preparation of Composite materials and briefly describe the Mechanical and Machinability Properties of Non-Woven Hybrid Composites...
This book is the first footprint in the research world of Vehicles as in Today's world the Vehicle security and Safety is most important. Now a days driving on highways becomes crucial when multipl...
The Maxifret freight exchange is a platform intended to connect shippers (industrialists, exporters, importers, individuals...) and transport professionals (carriers, forwarders...). DakiSoft has s...
Intrusion detection is defined as a second-line security mechanism that can detect intrusions that are launched either by an authorized user or those intrusions that originate from within the netwo...
Over the past few decades, we have all been taught to use an uppercase letter, a lowercase letter, a symbol and a number in our passwords. But in 2017, the National Institute of Standards and Techn...
The grinding process has been a topic of extensive research for the last 20 years, a complete understanding of the process has yet to be achieved. It is partly due to the fact that grinding is a co...
The use of hand tools is still widely appreciated in industries at various levels. Hand tools application varies from a simple task like hammering to complicated, complex and precision-demanding ta...
In the present study, Cr3C2-NiCr and Cr2O3 coatings were deposited on T-11 boiler steel by using the Detonation Gun (D-Gun) thermal spray technique with objective to check the hot corrosion resista...
The health sector is a very important sector for the public service. While the health of the population remains the State's priority, a computer scientist researcher is interested in the quality of...
Anomaly detection using Density Maximization Fuzzy C-means Algorithm: The rationale for the anomaly detection system using density maximization approach to the fuzzy c-means clustering algorithm. T...
The major aim of the study is to tailor the fiber volume fraction distribution in order to attain improved shaft designs and broaden its stability boundary against whirling and torsional buckling w...
The book presents materials and facts of development and implementation of complex non-contact control technologies implemented on the basis of electromagnetic resonance spectroscopy principles. Ex...
This book is an introduction to Scientific Calculus. Its aim is to present numerical methods for solving mathematical problems with a computer that cannot be dealt with simply with a sheet of paper...
This book publish state-of- the art analysis papers and important reviews of artificial intelligence, cognitive science, and related applications, techniques, and algorithms. Presents refereed rese...
Frequent pattern mining casts a vital part in many of significant data mining tasks such as associations, sequential patterns, partial periodicity, to name a few. Nevertheless, it is common knowled...
This is a vintage textbook on shoemaking originally designed for industrial, trade, and commercial schools in the early twentieth century. From tanning hides to boot repair, this comprehensive volu...
Nowadays, Non-linear data structures are very important in a variety of applications. The importance of trees is to make users understand any scenario in a beautiful manner. These trees whatever ar...