0 POZYCJI
KOSZYK PUSTY

Książki obcojęzyczne - nauki ścisłe i przyrodnicze

Znaleziono: 188 pozycji
Przeglądaj:
Sortuj według:
  • Popularność rosnąco
  • Popularność malejąco
  • Od najstarszych
  • Od najnowszych
  • Cena rosnąco
  • Cena malejąco
  • Tytuł od A do Z
  • Tytuł od Z do A
  • Autor od A do Z
  • Autor od Z do A
  • Wydawca od A do Z
  • Wydawca od Z do A
Popularność malejąco
Wyświetl:
  • 20
  • 40
  • 80
20
Security Framework - Manoj Dhawan

Security Framework

Autor: Manoj Dhawan
Security framework is that almost every application whether it is of web type or of non web type, it requires some kind of authentication system. The developers have to write the code for the same ...
Tuning Chevrolet Engine On The Dyno - Chi Ho Wong

Tuning Chevrolet Engine On The Dyno

Autor: Chi Ho Wong
The Chevy 302 Engine is tuned by varying the following items: 1) Intake airflow2) Manifolds3) Plenums4) Valve dynamics5) Spark points6) Rocker arms7) Chambers8) Cylinder heads9) Exhaust airflow10) ...
THE INTEGRATED MAINTENANCE - Faris Mohamed Hussein M.

THE INTEGRATED MAINTENANCE

This book is focused on how to build a comprehensive single maintenance framework from multi maintenance strategies and this frame work now is known as "the integrated maintenance framework". This ...
Identification system based on RFID technology - Evariste KANYINDA

Identification system based on RFID technology

Over the past few decades, we have witnessed a great revolution in the computer world. It has invaded all areas of daily life. As a result, computer systems are playing an increasingly important ro...
Evaluation of CO2-Philic Foam Surfactants as Mobility Control Agent - Seyedeh Hosna Talebian

Evaluation of CO2-Philic Foam Surfactants as Mobility Control Agent

This book is about CO2-philic surfactants evaluation for application in foam assisted CO2-WAG injection (FAWAG), under immiscible conditions of a Malaysian reservoir. The conventional foaming surfa...
Set-Up Design and Parametric Optimization of Abrasive Flow Machining - Rajeev Sharma

Set-Up Design and Parametric Optimization of Abrasive Flow Machining

Autor: Rajeev Sharma
In this book study and analysis of surface finish with abrasive flow machining. This book divided into three section. In first Section fabrication of abrasive flow machining and design parameters o...
Rice Mites of South Bengal, India - Sugandha Mukhopadhyay

Rice Mites of South Bengal, India

Rice is an important food crop of entire South-East Asia, South America and many other parts of the world. Unfortunately, this crop is attacked by hundreds of pests like insects, mites. nematodes, ...
Transport Planning and Engineering - Sunil Khyaju

Transport Planning and Engineering

Autor: Sunil Khyaju
Transport Planning and Engineering is a approved elective course of Purbanchal University, Nepal. The course contents the urban transport panning process, airport engineering, railway engineering a...
Outlier Detection Using A New Hybrid Approach On Mixed Dataset - Navneet Kaur

Outlier Detection Using A New Hybrid Approach On Mixed Dataset

Autor: Navneet Kaur
Data mining is a process of extracting hidden and useful information from the data. Outlier detection is a fundamental part of data mining and has huge attention from the research community recentl...
The Behavior of Ordinary and Geosynthetic Encased Stone Columns - Henok Lemma

The Behavior of Ordinary and Geosynthetic Encased Stone Columns

Autor: Henok Lemma
Suitable construction area is not always available; thus, a geotechnical engineer needs to modify the ground based on the technical requirements of each project.Collapsible soils make the construct...
A Critique of Dodd-Frank - Benjamin Solomon

A Critique of Dodd-Frank

The primary purpose of modeling is to be able to make good decisions. Having spent a decade in CMBS stress testing, in this monograph, I examine credit and default risk, that is, take it apart and ...
Information Security Over Cloud Computing - Ramasamy Balasubramani

Information Security Over Cloud Computing

Nowadays, data security is playing a significant role in the communication system as the hackers between transmissions media are more. The level of security depends on the secret key according to t...
A Comprehensive Study on Automotive Equipment - Pooja Singh

A Comprehensive Study on Automotive Equipment

Autor: Pooja Singh
Internal combustion engine consists of different systems for the efficient working. S.I. and C.I. engines are the basic types of I.C. engines. This book article comprises of the parts and the basic...
Novel Algorithm For Text Based Personality Classification - Veena Parihar

Novel Algorithm For Text Based Personality Classification

Autor: Veena Parihar
Personality ?f ? human being i? the mo?t tedious fa?tor to elaborate as each and every person may have different personality. The personality is useful in defining uniqueness of an individual. Ever...
Mechanical and Machinability Properties of Non-Woven Hybrid Composites - Sekar Sanjeevi

Mechanical and Machinability Properties of Non-Woven Hybrid Composites

This book includes the details about Natural fibres and its forms, Preparation of Composite materials and briefly describe the Mechanical and Machinability Properties of Non-Woven Hybrid Composites...
Development of Economical Monitoring System For Vehicle Security - Prasad H. Kulkarni

Development of Economical Monitoring System For Vehicle Security

This book is the first footprint in the research world of Vehicles as in Today's world the Vehicle security and Safety is most important. Now a days driving on highways becomes crucial when multipl...
The International Freight Exchange - Brahim Chichaoui

The International Freight Exchange

The Maxifret freight exchange is a platform intended to connect shippers (industrialists, exporters, importers, individuals...) and transport professionals (carriers, forwarders...). DakiSoft has s...
Fault - Tolerant Anomaly Detection System - Arjun Singh

Fault - Tolerant Anomaly Detection System

Autor: Arjun Singh
Intrusion detection is defined as a second-line security mechanism that can detect intrusions that are launched either by an authorized user or those intrusions that originate from within the netwo...
CRACK WINDOWS CLIENT AND WINDOWS SERVER PASSWORDS IN LESS THAN 60 SECONDS - Yao Ghislain N'DRI

CRACK WINDOWS CLIENT AND WINDOWS SERVER PASSWORDS IN LESS THAN 60 SECONDS

Over the past few decades, we have all been taught to use an uppercase letter, a lowercase letter, a symbol and a number in our passwords. But in 2017, the National Institute of Standards and Techn...
Modeling and Simulation of Surface Grinding Process - Mahesh Bote

Modeling and Simulation of Surface Grinding Process

Autor: Mahesh Bote
The grinding process has been a topic of extensive research for the last 20 years, a complete understanding of the process has yet to be achieved. It is partly due to the fact that grinding is a co...
Znaleziono: 188 pozycji
Przeglądaj:
Sortuj według:
  • Popularność rosnąco
  • Popularność malejąco
  • Od najstarszych
  • Od najnowszych
  • Cena rosnąco
  • Cena malejąco
  • Tytuł od A do Z
  • Tytuł od Z do A
  • Autor od A do Z
  • Autor od Z do A
  • Wydawca od A do Z
  • Wydawca od Z do A
Popularność malejąco
Wyświetl:
  • 20
  • 40
  • 80
20