Search alternatives:
hooney » honey (Expand Search), rooney (Expand Search), looney (Expand Search)
phoone » phoon (Expand Search)
conkey » monkey (Expand Search), donkey (Expand Search)
phone » phoone (Expand Search)
hon » hoon (Expand Search)
hong » hoong (Expand Search), kong (Expand Search)
hoong » choong (Expand Search), hoon (Expand Search)
hooney » honey (Expand Search), rooney (Expand Search), looney (Expand Search)
phoone » phoon (Expand Search)
conkey » monkey (Expand Search), donkey (Expand Search)
phone » phoone (Expand Search)
hon » hoon (Expand Search)
hong » hoong (Expand Search), kong (Expand Search)
hoong » choong (Expand Search), hoon (Expand Search)
-
1361
Social Structure and Social Stratification in Contemporary China /
Published 2020“…These key sociology issues are some of the topics this book covers. This book is a collection of the research articles and lectures that Dr. …”
Get full text
Get full text
software, multimedia -
1362
Algorithmic discrimination and ethical perspective of artificial intelligence /
Published [202“…This book delves into the complex intersection between artificial intelligence and human rights violations, shedding light on the far-reaching implications within the framework of discrimination and the pivotal role equality bodies play in combatting these issues. …”
Get full text
text -
1363
Optimization Techniques for Hybrid Power Systems : Renewable Energy, Electric Vehicles, and Smart Grid /
Published 2024“…With the current global energy crisis and the urgent need to address climate change, this book explores the latest advancements and research surrounding optimization techniques in the realm of renewable energy. …”
Get full text
software, multimedia -
1364
5G and Beyond : Fundamentals and Standards /
Published [202“…This book provides an accessible and comprehensive tutorial on the key enabling technologies for 5G and beyond, covering both the fundamentals and the state-of-the-art 5G standards. …”
text -
1365
Cybersecurity Blue Team Strategies : Uncover the secrets of blue teams to combat cyber threats in your organization /
Published 2023“…With this book, you'll be able to test and assess the effectiveness of your organization’s cybersecurity posture. …”
Get full text
Get full text
software, multimedia -
1366
Activated Sludge : Developments and Sustainable Solutions /
Published [202“…This interdisciplinary book is essential reading for both engineers and scientists whether training at university or practitioners and consultants in the wastewater industry…”
Get full text
software, multimedia -
1367
Streamlining Organizational Processes Through AI, IoT, Blockchain, and Virtual Environments /
Published [202“…The book covers a range of topics, including AI, fuzzy logic, IoT, and embedded systems. …”
Get full text
software, multimedia -
1368
Mastering Blockchain : Inner workings of blockchain, from cryptography and decentralized identities, to DeFi, NFTs and Web3 /
Published 2023“…Throughout the book, you’ll explore blockchain solutions beyond cryptocurrencies, such as the IoT with blockchain, enterprise blockchains, and tokenization, and gain insight into the future scope of this fascinating and disruptive technology.By the end of this blockchain book, you will have gained a thorough comprehension of the various facets of blockchain and understand the potential of this technology in diverse real-world scenarios.What you will learnGrasp the mechanisms behind Bitcoin, Ethereum, and other cryptocurrenciesUnderstand cryptography and its usage in blockchainBecome familiar with the theoretical foundations of smart contracts and blockchain consensusDevelop DApps using Solidity, Remix, Truffle, and GanacheSolve issues relating to privacy, identity, scalability, and security in enterprise blockchainsDive into the architecture of Ethereum 2.0Delve into emerging trends like DeFi, NFTs, and MetaverseExplore various applications, research topics, and future directions of blockchain Who this book is for. …”
Get full text
Get full text
software, multimedia -
1369
Executive's Cybersecurity Program Handbook : A comprehensive guide to building and operationalizing a complete cybersecurity program /
Published 2023“…This book will ensure that you can build a reliable cybersecurity framework to keep your organization safe from cyberattacks. …”
Get full text
Get full text
software, multimedia -
1370
The gravity of the status quo: the response of research governance to system-level shocks
Published 2024“…Aspirations for short-, medium- and long-term plans for research change echoed a dependency on returning to ‘normal’ and an inevitable pull of the norms of the pre-pandemic status quo. …”
Journal article -
1371
Innovation, Strategy, and Transformation Frameworks for the Modern Enterprise /
Published 2023“…The book begins by introducing the concept of frameworks in contemporary businesses. …”
Get full text
software, multimedia -
1372
The PSYCHOLOGY OF PERSUASION /
Published 2005“…This book contains the most powerful tools, strategies, and techniques of persuasion. …”
text -
1373
Migrants with a precarious status, evolving approaches of European cities
Published 2024“…This open access book is an exploration of city responses to migrants with a precarious status in Europe. …”
Book -
1374
Signature sequence for DS-CDMA cellular system
Published 2008“…The direct-sequence CDMA (DS-CDMA) scheme is the method currently being used by commercial cellular mobile phone systems. Every user in each user group is assigned its own code, that user codes are approximately orthogonal so that the cross-correlation of any two different codes tends to be zeros. …”
Get full text
Thesis -
1375
Hardware implementation of optimum channel codes
Published 2013“…One important aspect of signal processing that contributed to such luxuries is the channel coding, which is evident in our daily usage, ranging from mobile phone to satellite communications. Recently, a special class of block codes, known as Low Density Parity Check (LDPC) codes, has piqued interest upon many researchers for its capacity approaching performance as well as the speed of its decoding algorithm that transcends most existing channel codes.…”
Get full text
Thesis -
1376
Sworn oaths, golden writing and decapitated heads: communication in Thomas Malory's Le Morte D’Arthur
Published 2023“…Their resultant behaviours in the rest of Malory’s ‘Hoole Book’ often hearken back to rules stated in the oaths. …”
Get full text
Thesis-Master by Research -
1377
Micro-controller controlled solar-tracking system
Published 2009Get full text
Final Year Project (FYP) -
1378
-
1379
-
1380
Universal, Intuitive, and Permanent Pictograms : A Human-Centered Design Process Grounded in Embodied Cognition, Semiotics, and Visual Perception /
Published 2021“…The book analyzes characteristics of visual representations, grounded in semiotics. …”
text