Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber ...
Continue readingThe book describes practical methods that can be used for voltage security assessment and offers a variety of examples. This ...
Continue readingThe book chapters comprehensively and significantly highlight different scientific research disciplines related to wadi flash ...
Continue readingMultiple sclerosis (MS) is the most common inflammatory degenerative disease of the central nervous system in young adults. ...
Continue readingWell logging lies at the intersection of applied geophysics, petroleum and geotechnical engineering. It has its roots in ...
Continue readingChalcopyrites, in particular those with a wide band gap, are fascinating materials in terms of their technological potential ...
Continue readingX-Ray Fluorescence Spectroscopy for Laboratory Applications begins with a short overview of the physical fundamentals of ...
Continue readingFrom a structural point of view using these growth techniques ZnO can be fabricated ranging from single crystalline bulk ...
Continue reading