The Hobbit, Eragon, The Lord of the Rings, Harry Potter, The Sorcerer's Apprentice, heroic fantasy books and films, video games and fiction in general continue to inspire our times. Dragons, mages,...
Data mining is a process of extracting hidden and useful information from the data. Outlier detection is a fundamental part of data mining and has huge attention from the research community recentl...
Suitable construction area is not always available; thus, a geotechnical engineer needs to modify the ground based on the technical requirements of each project.Collapsible soils make the construct...
The primary purpose of modeling is to be able to make good decisions. Having spent a decade in CMBS stress testing, in this monograph, I examine credit and default risk, that is, take it apart and ...
Nowadays, data security is playing a significant role in the communication system as the hackers between transmissions media are more. The level of security depends on the secret key according to t...
Internal combustion engine consists of different systems for the efficient working. S.I. and C.I. engines are the basic types of I.C. engines. This book article comprises of the parts and the basic...
Personality ?f ? human being i? the mo?t tedious fa?tor to elaborate as each and every person may have different personality. The personality is useful in defining uniqueness of an individual. Ever...
This book includes the details about Natural fibres and its forms, Preparation of Composite materials and briefly describe the Mechanical and Machinability Properties of Non-Woven Hybrid Composites...
This book is the first footprint in the research world of Vehicles as in Today's world the Vehicle security and Safety is most important. Now a days driving on highways becomes crucial when multipl...
The task of philosophy consists in the creation of concepts that problematize what is taken for granted. Hence, this monograph shows how the use of the concept of normalization, created by the phil...
The Maxifret freight exchange is a platform intended to connect shippers (industrialists, exporters, importers, individuals...) and transport professionals (carriers, forwarders...). DakiSoft has s...
Intrusion detection is defined as a second-line security mechanism that can detect intrusions that are launched either by an authorized user or those intrusions that originate from within the netwo...
Over the past few decades, we have all been taught to use an uppercase letter, a lowercase letter, a symbol and a number in our passwords. But in 2017, the National Institute of Standards and Techn...
The grinding process has been a topic of extensive research for the last 20 years, a complete understanding of the process has yet to be achieved. It is partly due to the fact that grinding is a co...
The use of hand tools is still widely appreciated in industries at various levels. Hand tools application varies from a simple task like hammering to complicated, complex and precision-demanding ta...
The theme of this book: cross-cultural, marriage, poverty, war, death, history, these theme are very troublesome, but unfortunately we are all in them, they are confused in people's perception, clo...
In the present study, Cr3C2-NiCr and Cr2O3 coatings were deposited on T-11 boiler steel by using the Detonation Gun (D-Gun) thermal spray technique with objective to check the hot corrosion resista...
The health sector is a very important sector for the public service. While the health of the population remains the State's priority, a computer scientist researcher is interested in the quality of...
Anomaly detection using Density Maximization Fuzzy C-means Algorithm: The rationale for the anomaly detection system using density maximization approach to the fuzzy c-means clustering algorithm. T...
The major aim of the study is to tailor the fiber volume fraction distribution in order to attain improved shaft designs and broaden its stability boundary against whirling and torsional buckling w...