Over the past few decades, we have all been taught to use an uppercase letter, a lowercase letter, a symbol and a number in our passwords. But in 2017, the National Institute of Standards and Techn...
The grinding process has been a topic of extensive research for the last 20 years, a complete understanding of the process has yet to be achieved. It is partly due to the fact that grinding is a co...
The use of hand tools is still widely appreciated in industries at various levels. Hand tools application varies from a simple task like hammering to complicated, complex and precision-demanding ta...
In the present study, Cr3C2-NiCr and Cr2O3 coatings were deposited on T-11 boiler steel by using the Detonation Gun (D-Gun) thermal spray technique with objective to check the hot corrosion resista...
The health sector is a very important sector for the public service. While the health of the population remains the State's priority, a computer scientist researcher is interested in the quality of...
Anomaly detection using Density Maximization Fuzzy C-means Algorithm: The rationale for the anomaly detection system using density maximization approach to the fuzzy c-means clustering algorithm. T...
The major aim of the study is to tailor the fiber volume fraction distribution in order to attain improved shaft designs and broaden its stability boundary against whirling and torsional buckling w...
The book presents materials and facts of development and implementation of complex non-contact control technologies implemented on the basis of electromagnetic resonance spectroscopy principles. Ex...
This guide tells you all you need to know about the Safari App on your iPad and iPhone. This easy to read and comprehensive guide provide great hints and tips, and will help you get the most out o...
This book is an introduction to Scientific Calculus. Its aim is to present numerical methods for solving mathematical problems with a computer that cannot be dealt with simply with a sheet of paper...
This book publish state-of- the art analysis papers and important reviews of artificial intelligence, cognitive science, and related applications, techniques, and algorithms. Presents refereed rese...
SSD Tweaking and Optimization Guide For Windows 7, Windows 8.1 also Windows 10. Panduan mentweaking dan meningkatkan performa SSD untuk sistem operasi Windows 7 serta Windows 10 bagi pemula dalam b...
Frequent pattern mining casts a vital part in many of significant data mining tasks such as associations, sequential patterns, partial periodicity, to name a few. Nevertheless, it is common knowled...
Nowadays, Non-linear data structures are very important in a variety of applications. The importance of trees is to make users understand any scenario in a beautiful manner. These trees whatever ar...
The GFRP (glass fibre reinforced composite materials) are find up numerous application in many engineering and domestic fields due to their excellent mechanical properties and corrosion resistance....
School dropout is one of the most intriguing and crucial problems in Education. This problem permeates the various levels and modalities of education and generates social, economic, political, acad...
This work is part of the statistical learning of data for model development. More specifically, it is devoted to the study of random forests which are one of the most recent algorithms in the famil...
This work presents the simulation study of fracture behavior of steel and composites. The crack growth behavior of the material is simulated by extended finite element method (XFEM). XFEM allows th...
Edge detection is very important terminology in image processing and for computer vision. Edge detection is in the forefront of image processing for object detection, so it is crucial to have a goo...
The textbook presents the basic concepts of events and classification of events (reliable, impossible, equally possible, opposite, common and incompatible), the frequency and probability of events,...