Security framework is that almost every application whether it is of web type or of non web type, it requires some kind of authentication system. The developers have to write the code for the same ...
This book is focused on how to build a comprehensive single maintenance framework from multi maintenance strategies and this frame work now is known as "the integrated maintenance framework". This ...
Over the past few decades, we have witnessed a great revolution in the computer world. It has invaded all areas of daily life. As a result, computer systems are playing an increasingly important ro...
This book is about CO2-philic surfactants evaluation for application in foam assisted CO2-WAG injection (FAWAG), under immiscible conditions of a Malaysian reservoir. The conventional foaming surfa...
In this book study and analysis of surface finish with abrasive flow machining. This book divided into three section. In first Section fabrication of abrasive flow machining and design parameters o...
Rice is an important food crop of entire South-East Asia, South America and many other parts of the world. Unfortunately, this crop is attacked by hundreds of pests like insects, mites. nematodes, ...
Transport Planning and Engineering is a approved elective course of Purbanchal University, Nepal. The course contents the urban transport panning process, airport engineering, railway engineering a...
Data mining is a process of extracting hidden and useful information from the data. Outlier detection is a fundamental part of data mining and has huge attention from the research community recentl...
Suitable construction area is not always available; thus, a geotechnical engineer needs to modify the ground based on the technical requirements of each project.Collapsible soils make the construct...
The primary purpose of modeling is to be able to make good decisions. Having spent a decade in CMBS stress testing, in this monograph, I examine credit and default risk, that is, take it apart and ...
Nowadays, data security is playing a significant role in the communication system as the hackers between transmissions media are more. The level of security depends on the secret key according to t...
Internal combustion engine consists of different systems for the efficient working. S.I. and C.I. engines are the basic types of I.C. engines. This book article comprises of the parts and the basic...
Personality ?f ? human being i? the mo?t tedious fa?tor to elaborate as each and every person may have different personality. The personality is useful in defining uniqueness of an individual. Ever...
This book includes the details about Natural fibres and its forms, Preparation of Composite materials and briefly describe the Mechanical and Machinability Properties of Non-Woven Hybrid Composites...
This book is the first footprint in the research world of Vehicles as in Today's world the Vehicle security and Safety is most important. Now a days driving on highways becomes crucial when multipl...
The Maxifret freight exchange is a platform intended to connect shippers (industrialists, exporters, importers, individuals...) and transport professionals (carriers, forwarders...). DakiSoft has s...
Intrusion detection is defined as a second-line security mechanism that can detect intrusions that are launched either by an authorized user or those intrusions that originate from within the netwo...
Over the past few decades, we have all been taught to use an uppercase letter, a lowercase letter, a symbol and a number in our passwords. But in 2017, the National Institute of Standards and Techn...
The grinding process has been a topic of extensive research for the last 20 years, a complete understanding of the process has yet to be achieved. It is partly due to the fact that grinding is a co...