Search alternatives:
"experiment" » "experiments" (Expand Search)
"experimentsalalalallysssal" » "experimentssalalalallysssal" (Expand Search), "experimentallyalallysssal" (Expand Search), "experimentsalalallysssal" (Expand Search), "experimentallyalalallysssal" (Expand Search)
"experimentsalal" » "experimentssalal" (Expand Search), "experimentally" (Expand Search), "experimentsal" (Expand Search), "experimentallyal" (Expand Search)
"experimentalsalal" » "experimentsalsalal" (Expand Search), "experimentally" (Expand Search)
"experimentsal" » "experimentssal" (Expand Search), "experiments" (Expand Search), "experimentally" (Expand Search)
"experimentalsally" » "experimentsalsally" (Expand Search), "experimentally" (Expand Search)
"experimentsalalsumsals" » "experimentssalalsumsals" (Expand Search), "experimentallysumsals" (Expand Search), "experimentsalsumsals" (Expand Search), "experimentallyalsumsals" (Expand Search)
"experimentssum" » "experimentsssum" (Expand Search), "experiments" (Expand Search)
"experimentsum" » "experimentssum" (Expand Search), "experiments" (Expand Search)
"experimental" » "experimentsal" (Expand Search)
"experimentum" » "experimentsum" (Expand Search), "experiments" (Expand Search)
"experimentalss" » "experimentsalss" (Expand Search), "experimentally" (Expand Search), "experiments" (Expand Search)
"experimentalssalalss" » "experimentsalssalalss" (Expand Search), "experimentallyalalss" (Expand Search), "experimentsalalss" (Expand Search)
"experimentalally" » "experimentsalally" (Expand Search), "experimentally" (Expand Search)
"experimentalals" » "experimentsalals" (Expand Search), "experimentally" (Expand Search)
"experimentssalals" » "experimentsssalals" (Expand Search), "experimentally" (Expand Search)
"experimentssals" » "experimentsssals" (Expand Search)
"experimentellesssally" » "experimentsellesssally" (Expand Search), "experimentallysssally" (Expand Search)
"experimentsalalalsally" » "experimentssalalalsally" (Expand Search), "experimentallyalsally" (Expand Search), "experimentsalalsally" (Expand Search), "experimentallyalalsally" (Expand Search)
"experimentssalalalsally" » "experimentsssalalalsally" (Expand Search)
"experimentelleally" » "experimentselleally" (Expand Search), "experimentally" (Expand Search), "experimentallyally" (Expand Search)
"experimentelle" » "experimentselle" (Expand Search), "experimentally" (Expand Search)
"experimentalsalelle" » "experimentsalsalelle" (Expand Search)
"experimentalalelle" » "experimentsalalelle" (Expand Search)
"experimentssalelle" » "experimentsssalelle" (Expand Search)
"experimentssssalsly" » "experimentsssssalsly" (Expand Search)
"experimentallyalsly" » "experimentsallyalsly" (Expand Search)
"experimentselleally" » "experimentsselleally" (Expand Search)
"experimentalselle" » "experimentsalselle" (Expand Search), "experimentally" (Expand Search)
"experiential" » "experiencing" (Expand Search)
Showing 98,661 - 98,680 results of 116,298 for search '(("experiment" OR (((("experiential" OR "experiential") OR "experimentsalalalallysssal") OR (("experimentsalal" OR "experimentalsalal") OR ("experimentsal" OR "experimentalsally"))) OR "experience")) OR ((("experimentsalalsumsals" OR ("experimentssum" OR (("experimentsum" OR "experimental") OR "experimentum"))) OR ((("experimentalss" OR "experimentalssalalss") OR "experimentalally") OR (("experimentalals" OR "experimentssalals") OR "experimentssals"))) OR ((("experimentellesssally" OR ("experimentsalalalsally" OR "experimentssalalalsally")) OR ((("experimentelleally" OR "experimentalally") OR (("experimentelle" OR ("experimentalsalelle" OR "experimentalalelle")) OR "experimentssalelle")) OR "experimentsal")) OR ("experimentalally" OR (("experimentssssalsly" OR "experimentallyalsly") OR ("experimentselleally" OR "experimentalselle"))))))', query time: 1.34s Refine Results
  1. 98661

    Introduction to private equity : venture, growth, LBO & turn-around capital by Demaria, Cyril

    Chichester, West Sussex : John Wiley & Sons Inc., 2013
    Second edition.
    Format: Electronic eBook
    Full text (Wentworth users only)
  2. 98662

    Artificial intelligence for intelligent systems : fundamentals, challenges, and applications

    Boca Raton, FL : CRC Press, 2024
    First edition.
    Format: Electronic eBook
    Full text (Wentworth users only)
  3. 98663

    Designing platform independent mobile apps and services by Heckman, Rocky

    Hoboken : Wiley-IEEE Press, 2016
    1st
    Format: Electronic eBook
    Full text (Wentworth users only)
  4. 98664
  5. 98665

    Advanced mathematical modeling with technology by Fox, William P., 1949-, Burks, Robert E.

    Boca Raton : Chapman & Hall/CRC, 2021
    1st.
    Format: Electronic eBook
    Full text (WIT users only)
  6. 98666

    5G wireless communication system in healthcare informatics

    Boca Raton : CRC Press, 2023
    First edition.
    Format: Electronic eBook
    Full text (WIT users only)
  7. 98667
  8. 98668

    Proceedings of International Conference on ICT for Sustainable Development ICT4SD 2015 Volume 1

    Singapore : Springer Singapore : Imprint: Springer, 2016
    1st ed. 2016.
    Format: Electronic eBook
    Full text (Wentworth users only)
    Full text (Wentworth users only)
  9. 98669
  10. 98670
  11. 98671

    LOW-POWER WIDE AREA NETWORK FOR LARGE SCALE INTERNET OF THINGS

    [S.l.] : CRC PRESS, 2024
    Format: Electronic eBook
    Full text (WIT users only)
  12. 98672
  13. 98673

    Reporting Vietnam.

    New York : Literary Classics of the United States, 1998
    Format: Book


  14. 98674

    Freshwater pollution and aquatic ecosystems : environmental impact and sustainable management

    Palm Bay, FL, USA ; Burlington, ON, Canada : Boca Raton, FL, USA ; Abingdon, Oxon, UK : Apple Academic Press ; CRC Press, 2022
    First edition.
    Format: Electronic eBook
    Full text (WIT users only)
  15. 98675
  16. 98676
  17. 98677

    Smart electronic systems : heterogeneous integration of silicon and printed electronics by Zheng, Li-Rong, Tenhunen, Hannu, Zou, Zhuo

    Weinheim, Germany : Wiley-VCH Verlag GmbH & Co. KGaA, 2018
    Format: Electronic eBook
    Full text (Wentworth users only)
    Full text (Wentworth users only)
  18. 98678

    Security issues and privacy concerns in Industry 4.0 applications by David, Shiblin, Anand, R. S., Jeyakrishnan, V., Niranjanamurthy, M.

    Hoboken : Wiley-Scrivener, 2021
    Table of Contents: “…Vijayprakash</i> -- 3.1 Introduction 36 -- 3.2 Automatic Speech Recognition System 39 -- 3.2.1 Preprocessing 41 -- 3.2.2 Feature Extraction 42 -- 3.2.2.1 Linear Predictive Coding (LPC) 42 -- 3.2.2.2 Linear Predictive Cepstral Coefficient (LPCC) 44 -- 3.2.2.3 Perceptual Linear Predictive (PLP) 44 -- 3.2.2.4 Power Spectral Analysis 44 -- 3.2.2.5 Mel Frequency Cepstral Coefficients 45 -- 3.2.2.6 Wavelet Transform 46 -- 3.2.3 Implementation of Deep Learning Technique 46 -- 3.2.3.1 Recurrent Neural Network 47 -- 3.2.3.2 Long Short-Term Memory Network 47 -- 3.2.3.3 Hidden Markov Models (HMM) 47 -- 3.2.3.4 Hidden Markov Models -- Long Short-Term Memory Network (HMM-LSTM) 48 -- 3.2.3.5 Evaluation Metrics 49 -- 3.3 Literature Survey on Existing TSRS 49 -- 3.4 Conclusion 52 -- References 52 -- <b>4 Approximation Algorithm and Linear Congruence: An Approach for Optimizing the Security of IoT-Based Healthcare Management System 55<br /></b><i>Anirban Bhowmik and Sunil Karforma</i> -- 4.1 Introduction 56 -- 4.1.1 IoT in Medical Devices 56 -- 4.1.2 Importance of Security and Privacy Protection in IoT-Based Healthcare System 57 -- 4.1.3 Cryptography and Secret Keys 58 -- 4.1.4 RSA 58 -- 4.1.5 Approximation Algorithm and Subset Sum Problem 58 -- 4.1.6 Significance of Use of Subset Sum Problem in Our Scheme 59 -- 4.1.7 Linear Congruence 60 -- 4.1.8 Linear and Non-Linear Functions 61 -- 4.1.9 Pell's Equation 61 -- 4.2 Literature Survey 62 -- 4.3 Problem Domain 63 -- 4.4 Solution Domain and Objectives 64 -- 4.5 Proposed Work 65 -- 4.5.1 Methodology 65 -- 4.5.2 Session Key Generation 65 -- 4.5.3 Intermediate Key Generation 67 -- 4.5.4 Encryption Process 69 -- 4.5.5 Generation of Authentication Code and Transmission File 70 -- 4.5.6 Decryption Phase 71 -- 4.6 Results and Discussion 71 -- 4.6.1 Statistical Analysis 72 -- 4.6.2 Randomness Analysis of Key 73 -- 4.6.3 Key Sensitivity Analysis 75 -- 4.6.4 Security Analysis 76 -- 4.6.4.1 Key Space Analysis 76 -- 4.6.4.2 Brute-Force Attack 77 -- 4.6.4.3 Dictionary Attack 77 -- 4.6.4.4 Impersonation Attack 78 -- 4.6.4.5 Replay Attack 78 -- 4.6.4.6 Tampering Attack 78 -- 4.6.5 Comparative Analysis 79 -- 4.6.5.1 Comparative Analysis Related to IoT Attacks 79 -- 4.6.6 Significance of Authentication in Our Proposed Scheme 85 -- 4.7 Conclusion 85 -- References 86 -- <b>5 A Hybrid Method for Fake Profile Detection in Social Network Using Artificial Intelligence 89<br /></b><i>Ajesh F, Aswathy S U, Felix M Philip and Jeyakrishnan V</i> -- 5.1 Introduction 90 -- 5.2 Literature Survey 91 -- 5.3 Methodology 94 -- 5.3.1 Datasets 94 -- 5.3.2 Detection of Fake Account 94 -- 5.3.3 Suggested Framework 95 -- 5.3.3.1 Pre-Processing 97 -- 5.3.3.2 Principal Component Analysis (PCA) 98 -- 5.3.3.3 Learning Algorithms 99 -- 5.3.3.4 Feature or Attribute Selection 102 -- 5.4 Result Analysis 103 -- 5.4.1 Cross-Validation 103 -- 5.4.2 Analysis of Metrics 104 -- 5.4.3 Performance Evaluation of Proposed Model 105 -- 5.4.4 Performance Analysis of Classifiers 105 -- 5.5 Conclusion 109 -- References 109 -- <b>6 Packet Drop Detection in Agricultural-Based Internet of Things Platform 113<br /></b><i>Sebastian Terence and Geethanjali Purushothaman</i> -- 6.1 Introduction 113 -- 6.2 Problem Statement and Related Work 114 -- 6.3 Implementation of Packet Dropping Detection in IoT Platform 115 -- 6.4 Performance Analysis 120 -- 6.5 Conclusion 129 -- References 129 -- <b>7 Smart Drone with Open CV to Clean the Railway Track 131<br /></b><i>Sujaritha M and Sujatha R</i> -- 7.1 Introduction 132 -- 7.2 Related Work 132 -- 7.3 Problem Definition 134 -- 7.4 The Proposed System 134 -- 7.4.1 Drones with Human Intervention 134 -- 7.4.2 Drones without Human Intervention 135 -- 7.4.3 Working Model 137 -- 7.5 Experimental Results 137 -- 7.6 Conclusion 139 -- References 139 -- <b>8 Blockchain and Big Data: Supportive Aid for Daily Life 141<br /></b><i>Awais Khan Jumani, Asif Ali Laghari and Abdullah Ayub Khan</i> -- 8.1 Introduction 142 -- 8.1.1 Steps of Blockchain Technology Works 144 -- 8.1.2 Blockchain Private 144 -- 8.1.3 Blockchain Security 145 -- 8.2 Blockchain vs. …”
    Format: Electronic eBook
    Full text (Wentworth users only)
  19. 98679

    Modern architecture in Latin America : art, technology, and utopia by Carranza, Luis E., 1968-, Lara, Fernando Luiz

    Austin, TX : University of Texas Press, 2014
    First edition.
    Table of Contents: “…Affonso Reidy: halfway between the Carioca school and the Paulista school -- 1953-B. El Eco Experimental Museum in Mexico City opens its doors, advocating for an "emotional architecture." -- 1953-C. …”
    Format: Government Document Electronic eBook
    Full text (Emerson users only)
    Full text (Emmanuel users only)
    Full text (NECO users only)
    Full text (MCPHS users only)
    Full text (Wentworth users only)
  20. 98680

    Prospects in Bioscience: Addressing the Issues by Sabu, Abdulhameed

    India : Springer India : Imprint: Springer, 2013
    Table of Contents: “…Mandal, H Akbari, N Munshi.-42.Experimental and theoretical investigations on the anti-oomycetous activity of paromomycin targeted against Pythium tubulin,Resna A.K, Geethu C, Sumna S, Jaleel U.C, Aswati Nair R -- 43.Prenatal genetic studies on intra uterine growth retardation,Jisha P, Manikkumar R, Dinesh Roy D, Alex K Ittyavirah.-44.Performance of West African dwarf sheep fed with selected tropical roughage sources: Rumen microbial analysis and nutrient utilization,O. …”
    Format: Electronic eBook
    Full text (Wentworth users only).