Our project aims to design and implement a computer-controlled remote laboratory that can be accessed and controlled via ...
اقرأ المزيدThis book proposes a unified algorithmic framework based on dual optimization techniques that have complexities that are ...
اقرأ المزيدThis review will examine the classical proteins that have been linked to acid secretion as well as some recently identi?ed ...
اقرأ المزيدThe cells of the renal proximal tubule have a high capacity for uptake of proteins filtered in the glomeruli, reflected by ...
اقرأ المزيدThis book treats the robust design of signal processing algorithms for wireless communications which are based on an incomplete ...
اقرأ المزيدNeurotoxins are the main components of scorpion venom that are known to be responsible for the pathological manifestations ...
اقرأ المزيدT this book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent ...
اقرأ المزيدAll living cells are able to detect and translate environmental stimuli into biologically meaningful signals. Sensations ...
اقرأ المزيدSmart cards are an established security research area with a very unique pr- erty: it integrates numerous sub?elds of IT ...
اقرأ المزيدProvides a complete, current and comprehensive overview of snake venoms Contributes to a series on all areas of toxinology, ...
اقرأ المزيدSodium channels confer excitability on neurons in nociceptive pathways and exhibit neuronal tissue specific and injury regulated ...
اقرأ المزيدThis book constitutes the thoroughly refereed post-conference proceedings of the 14th International Conference on Software ...
اقرأ المزيدExamines the 'inventory' or 'working capital' angle, which is overlooked in many of the more strategic supply chain management ...
اقرأ المزيدThis book represents an updated review of the physiology of the carotid body chemoreceptors. Additionally, this volume provides ...
اقرأ المزيدThis book constitutes the 14th edition of the annual Multi-Agent Programming Contest, MAPC 2019, and presents its participants. The ...
اقرأ المزيدThe first three papers describe the applicability of bio-inspired techniques in the technical domain of computing and communication. ...
اقرأ المزيدThe first two papers deal with the security of steganographic systems; the third paper presents a novel image steganographic ...
اقرأ المزيدThe main goal of this volume is to provide up-to-date information on the molecular and functional properties and pharmacology ...
اقرأ المزيدA major focus of Turbo-like Codes is on high speed turbo decoding, which targets applications with data rates of several ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 4th International Conference on Ubiquitous Communications and Network ...
اقرأ المزيد