Skip to main content
This proposed experimental investigation is to obtain the performance of geopolymer concrete (GPC) based on a binary mixture of pozzolonic materials viz, Fly Ash (FA) and Ground Granulated Blast Furnace Slag (GGBFS) in 3 different ratios:... more
    • by 
    • Computer Engineering
    • by 
    •   3  
      Computer ScienceComputer EngineeringWireless Communications
    • by 
    •   2  
      EngineeringComputer Engineering
Online material for a Z course based on the book by the author. This includes slides for some chapters and the exercises. Updated in July 1998 with minor corrections and improved formatting.
    • by 
    •   14  
      Set TheoryComputer ScienceSoftware EngineeringFormal Methods (Formal Verification)
In Industrial environments, huge amount of data is being generated which in turn collected indatabase anddata warehouses from all involved areas such as planning, process design, materials, assembly, production, quality, process control,... more
    • by 
    •   22  
      BioinformaticsComputer ScienceAlgorithmsComputer Architecture
    • by 
    •   14  
      Computer ScienceComputer EngineeringEmbedded SystemsComplex System
    • by 
    •   7  
      Computer ScienceComputer EngineeringEmbedded SystemsLinux (Ubuntu)
    • by 
    •   8  
      Computer ScienceSoftware EngineeringProgramming LanguagesHuman Computer Interaction
    • by 
    •   5  
      Computer ScienceArtificial IntelligenceComputer EngineeringAcademia
    • by 
    •   4  
      Computer ScienceSoftware EngineeringComputer EngineeringComputer Networks
    • by 
    •   2  
      Computer EngineeringAutomatic Control
    • by 
    •   5  
      Computer ScienceSoftware EngineeringComputer EngineeringDatabase Systems
In recent years, media has become ubiquitous and important for networking and content sharing. Interest in the impact of media on the “real world” is as old as media itself. At the dawn of a new era, vast expansion in the advancement of... more
    • by 
    •   9  
      Operating SystemsComputer EngineeringDatabase SystemsComputer Networks
Electricity has become one of the basic requirements for human life, being widely used for domestic, industrial and agricultural purposes. In our work, we propose a digital energy meter which measures the energy consumption and the energy... more
    • by 
    •   2  
      Electrical EngineeringComputer Engineering
    • by 
    • Computer Engineering
    • by 
    •   5  
      Computer ScienceInformation SecurityComputer EngineeringComputer Networks
An efficient and new but non-intrusive method to detect the fluctuation in gear load may be the motor current signature analysis (MCSA). In this paper, a multi-stage transmission gearbox (with and without defects) has been studied in... more
    • by 
    •   18  
      EngineeringElectrical EngineeringElectronic EngineeringEnvironmental Engineering
    • by 
    •   3  
      Computer ScienceSoftware EngineeringComputer Engineering
    • by 
    •   7  
      Computer ScienceInformaticsKnowledge ManagementComputer Engineering
This paper presents the sharing of our experiences and lessons learned to modernize a warship with C6ISR utilizing the digital engineering MBSE models of complex systems. We captured Enterprise Architecture (EA) DoDAF views, KPP and KSA... more
    • by 
    •   6  
      EngineeringComputer EngineeringSystems EngineeringComputer Networks
Get Valid Dumps Visit Now: https://www.theexamdumps.com/Scrum/PSM-I-exam-questions - We are providing you Scrum PSM-I exam questions to our exam user. The will help you to pass your PSM-I Professional Scrum Master I exam very easily and... more
    • by 
    • Computer Engineering
    • by 
    •   2  
      Computer EngineeringComputer Networks
Augmented reality in public spaces This manual is aimed at enthusiasts and experimenters in the visual field who wish to acquire the skills for creating video mapping performances. It has been done intentionally to enter into the category... more
    • by  and +1
    •   8  
      Computer EngineeringVirtual Reality (Computer Graphics)Augmented RealityConcept Mapping
Network security is one of the major concerns of world. We all know that the systems on the internet are increasing day by day and so the vulnerabilities. These vulnerabilities must be found before the attacker. This can be done with the... more
    • by 
    •   2  
      Computer ScienceComputer Engineering
What is the organizational structure of Google and how it became very successful in a very short interval of time?
    • by 
    •   4  
      Computer ScienceInformation TechnologyInformaticsComputer Engineering
    • by 
    •   20  
      Computer ScienceComputer Aided EngineeringComputer EngineeringManufacturing
    • by 
    •   13  
      Information SystemsElectrical EngineeringControl Systems EngineeringComputer Science
Full file at https://testbanku.      Full file at https://testbanku.eu/
    • by 
    •   15  
      Civil EngineeringSoftware EngineeringHealth SciencesPolitical Economy
https://journalistethics.com/ Free book available for download at this web page. This book is about the NESARA Bill and its connection to a Global Currency Reset. This book investigates NESARA's connection to Donald Trump's "Drain the... more
    • by 
    •   20  
      BusinessFinanceEngineeringElectrical Engineering
    • by 
    •   2  
      Computer ScienceComputer Engineering
    • by 
    •   3  
      Computer ScienceSoftware EngineeringComputer Engineering
    • by 
    •   9  
      Information SystemsComputer ScienceSoftware EngineeringComputer Engineering
This Paper explores and summarises the Director's Duties of the UK Companies Act 2006 with emphasis on "the duty to promote the success of the company. Tags: Companies Act 2006 model articles, Companies Act 2006 summary companies act... more
    • by 
    •   147  
      Critical TheoryBusinessOrganizational BehaviorManagement
    • by 
    •   4  
      Computer ScienceComputer EngineeringWireless CommunicationsComputer Networks
This is an era of technology; we are surrounded with the technology. Now a day’s people become smarter they want to operate each and everything’s with his smart phone/laptop/pc without going anywhere, it happens due to IOT devices.... more
    • by 
    •   10  
      Computer ScienceInformation TechnologyComputer Science EducationComputer Engineering
    • by 
    •   3  
      Computer ScienceComputer EngineeringComputer Networks
Online bookstore software projects that acts as a central database containing various books in stock along with their title, author and cost. This project is a website that acts as a central book store. This web project is developed using... more
    • by 
    •   4  
      Computer ScienceComputer EngineeringSoftware DevelopmentSoftware
Bilgisayar kesmeleri olarak çevirisini düşündüğüm, computer interrupt hakkında küçük bir mülahaza. Kaynaklardan okuduğum ve uygun gördüğüm karşılıklarla açığa çıkardığım araştırma kağıdıdır. Kesmeler arasında bir karşılaştırım(benchmark)... more
    • by 
    •   5  
      Computer ScienceComputer EngineeringBilgisayarCOMPUTER SCIENCE & ENGINEERING
    • by 
    •   4  
      ManagementComputer EngineeringOperations ResearchBusiness Management
Paket anahtarlama kapsamında bir genel bakış.
    • by 
    •   9  
      Computer ScienceComputer EngineeringComputer NetworksComputer Networking and Telecommunication
Dear Reader, Let's get the introductions out of the way.I am not a recruiter. I am a software engineer. And as such, I know what it's like to be asked to whip up brilliant algorithms on the spot and then write flawless code on a... more
    • by 
    •   20  
      BusinessBusiness AdministrationComputer ScienceSoftware Engineering
    • by 
    •   4  
      Computer ScienceInformation SecurityComputer EngineeringComputer Security
    • by 
    •   6  
      Information SystemsComputer ScienceInformation TechnologyComputer Engineering
https://journalistethics.com/ Free book available for download at this link This book is about the Q Anon phenomenon also known as Q. Key words Q QAnon Q decode Q Clock Crumb Crumbs WWG1WGA JFK JFK Junior Anon Anons President Donald J... more
    • by 
    •   20  
      FinanceEngineeringElectrical EngineeringCivil Engineering
Proceedings of the INTERNATIONAL CONFERENCE ON
"CYBERSPACE GOVERNANCE:The Imperative For National & Economic Security"
    • by 
    •   47  
      HistorySociologySocial PsychologyGeography
    • by 
    •   5  
      Computer ScienceSoftware EngineeringComputer EngineeringDatabase Systems
Virtual reality applications refer to the use of com- puters to simulate a physical environment in such a way that humans can readily visualize, explore, and interact with "objects" in this environment. The design of virtual... more
    • by 
    •   10  
      Computer ScienceComputer EngineeringVirtual Reality (Computer Graphics)Virtual Reality
    • by 
    •   10  
      Computer ScienceInformation SecurityComputer EngineeringComputer Security
Open source software (OSS) in academia can have multiple types of implementations and positive returns. This paper explores the use of OSS as a method to teach entrepreneurship concepts and practices to Science, Technology, Engineering,... more
    • by 
    •   20  
      Information SystemsEngineeringElectrical EngineeringMathematics
Transports are the foremost method of road transportation. The appearance of the vehicle body depends primarily driving the execution requirement underneath varying sorts of stacking and managing situations separated from those of the... more
    • by 
    • Computer Engineering