Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber ...
Lire la suiteThe book describes practical methods that can be used for voltage security assessment and offers a variety of examples. This ...
Lire la suiteThe book chapters comprehensively and significantly highlight different scientific research disciplines related to wadi flash ...
Lire la suiteMultiple sclerosis (MS) is the most common inflammatory degenerative disease of the central nervous system in young adults. ...
Lire la suiteWell logging lies at the intersection of applied geophysics, petroleum and geotechnical engineering. It has its roots in ...
Lire la suiteChalcopyrites, in particular those with a wide band gap, are fascinating materials in terms of their technological potential ...
Lire la suiteX-Ray Fluorescence Spectroscopy for Laboratory Applications begins with a short overview of the physical fundamentals of ...
Lire la suiteFrom a structural point of view using these growth techniques ZnO can be fabricated ranging from single crystalline bulk ...
Lire la suite