Chapter RDF
pages:- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- more...
- An Optimized Tuning of Genetic Algorithm Parameters in Compiler Flag Selection Based on Compilation and Execution Duration
- An Overview of Biomass Conversion Technologies in Nigeria
- An Overview of Electric Vehicle Technology
- An Overview of Electric Vehicle Technology
- An Overview of Unique Metal Oxide Nanostructures for Biosensor Applications
- An Overview: Mechanical and Wear Properties of HDPE Polymer Nanocomposites Reinforced with Treated/Non-treated Inorganic Nanofillers
- Anaerobic Treatment of Chicken Manure Co-digested with Sawdust
- Analysis of Brain Tumor Detection Using Machine Learning
- Analysis of Chemical Plant Process Safety Information Integration Model from Information System Perspective
- Analysis of Frictional Stress Variations along Tooth Contact of Spur and Helical Gears
- Analysis of Intelligent Agent and Its Components for the SLA Negotiation Process in Cloud Computing
- Analysis of Multimedia Elements Criteria Using AHP Method
- Analysis of Optimally Tuned Active Dynamic Vibration Absorber
- Analysis of Spread Moored FPSO-Tanker Side-by-Side System with Offloading Operability
- Analysis of Tensile and Hardness of Empty Fruit Bunch/Chitosan Reinforced with Graphene Oxide Composite Film
- Analysis of the Impact of Degradation on Gas Turbine Performance Using the Support Vector Machine (SVM) Method
- Analysis on Fatigue Life of Mixing Tee Weldments Subjected to Dynamic Loadings in Piping Systems
- Analysis on Part Load Performance of EC Operations at District Cooling Plant
- Analytical Comparison of Factors Affecting EHR Visualization for Physicians in Public Health Care Units
- Analytical Modeling for Switched Damping Electromagnetic Energy Harvester
- Analyzing Early Indicators of Ransomware: Pre-encryption Behavior Patterns
- Analyzing Framework for Alternate Execution of Workflows for Different Types of Intrusion Threats
- Analyzing the effects of uncertainties on the economic performance of a chemical process plant using a probabilistic optimization technique
- Analyzing the Obstacles and Process of Introducing Building Information Modeling (BIM) in the Design Stage of C&S Engineering Consulting Firm Within Malaysia
- Anomalies in Mooring (Thin) Lines: Causes, Risk Mitigations, and Real Time Consequences of Failure – A Comprehensive Review
- Anomaly Intrusion Detection Systems in IoT Using Deep Learning Techniques: A Survey
- Anomaly Localization at High-Density Crowd Using Motion Shape Image (MSI)
- Ant Colony Optimization and Feature Selection for Intrusion Detection
- Anti-friction Bearing Malfunction Detection and Diagnostics Using Hybrid Approach
- Antimicrobial Property of Biosynthesized Silver Nanoparticles