Showing 158,001 - 158,020 results of 173,783 for search '(("klight" OR (((("slight" OR ("slightly" OR "sightly")) OR "flight") OR (((("fright" OR ("wrights" OR "frightsss")) OR ((((("wrights" OR "frightsss") OR "frightsss") OR "frightsss") OR "fights") OR (("nights" OR "night") OR ("heights" OR "eight")))) OR "might") OR (("wheights" OR "weight") OR "wrights"))) OR ("flightly" OR "frightsly"))) OR (("right" OR "rights") OR "light"))', query time: 1.60s Refine Results
  1. 158001
  2. 158002

    Advances in Communication and Applications Proceedings of ERCICA 2023, Volume 2

    Singapore : Springer Nature Singapore : Imprint: Springer, 2024
    1st ed. 2024.
    Table of Contents: “…Application of Artificial Neural Network for the Validation of Airfoil Efficiency -- Predicting Holding Days for Equity Gain Using Wavelets -- Intelligent Camera Based Eye Controlled Wheelchair System: Raspberry Pi and Advanced Algorithms -- TinyML based Human and Animal Movement Detection in Agriculture fields in India -- Social Distancing Monitoring for Real time -- Deep Learning Framework -- Designing Energy Routing Protocol with Energy Consumption Optimization in Cognitive Radio Networks -- Implementation of the AES Algorithm on FPGA -- Security System Using Pir Sensor -- A novel design and implementation of Full Adder Circuit using QCA and Qiskit -- GitHub Users Recommendations based on Repositories and User Profile -- Social Network Hashtag Analysis for the 75th Year of India’s Independence -- A Survey Analysis on Dental Caries Detection From RVG Images Using Deep Learning -- IOT Based Smart Agriculture Monitoring System Using Web-Application -- An Analysis of the Effects of the COVID-19 Pandemic on Women's Anxiety and Depression Symptoms -- An Exploration of State of Art Approaches on Low-light Image Enhancement Techniques -- Skin Cancer Detection With Metadata Using Deep Learning Stratagies -- Detect and Alleviate DDOS Attacks in Cloud Environment -- Smart Grading System Using BI LSTM With Attention Mechanism -- Analysis and Prediction of Polycystic Ovarian Syndrome using ML Classifiers -- Classification of Breast Cancer using Computational Machine Learning Algorithms -- Credit Card Fraud Analysis using Machine Learning -- Machine Learning Approaches for Stroke Detection and SMOTE for Imbalanced Data -- Prediction of cost for medical care insurance by using Regression models -- Load frequency control using PID and Particle Swarm Optimization-ITAE -- Efficacy of Papworth Method to Improve Quality of Life and Exercise Tolerance in Asthma -- CNN approach for Plant Disease detection – Krishi Snehi -- Lung cancer Classification and Prediction based on Statistical Feature Selection Method Using Data Mining Techniques -- Optimal Solution for Distance Detectionusing Deep Learning Techniques on Embedded devices -- Cloud Data Security Using Hybrid Encryption With Blockchain -- Indian Image Dataset for the Image Forgery -- Detection of Pneumonia From Chest X-ray using Deep Learning -- Image Captioning using CNN-LSTM -- Future Sales Prediction Using Regression & Deep Learning Techniques -- Rider Face Mask Detection and Alerting using Machine Learning Techniques -- Methods for Improving User Position Accuracy in IRNSS(NavIC) Receiver -- Specular Reflection Removal Techniques in Cervix Image: A Comprehensive Review -- An Exploration of State of Art Approaches on Substrate Integrated Waveguide Technology based Antennas for Wireless Applications -- Daily Platelet Count Prediction in treating Dengue Patients using Deep Learning Algorithm -- Hybrid Data Science Approaches to Predict the Academic Performance of Students -- GAN-based Image Restoration and Colorization -- Novel Adaptive Learning Rate Back PropagationNeural Network-Based Online Rotor and Stator Resistance Estimator for Sensorless Induction Motor Drives -- An efficient KNN algorithm for the mental health performance assessment using k-means clustering -- Classification of Skin Cancer using Deep Learning.…”
    Format: Electronic eBook
    Full text (Wentworth users only)
  3. 158003
  4. 158004
  5. 158005
  6. 158006

    The cloak of dreams : Chinese fairy tales by Balázs, Béla, 1884-1949

    Princeton, N.J. : Princeton University Press, 2010
    Format: Book


  7. 158007

    DNA- and RNA-based computing systems

    Weinheim, Germany : Wiley-VCH, 2021
    First edition.
    Table of Contents: “…4.5 Conclusion -- References -- Chapter 5 Development of Logic Gate Nanodevices from Fluorogenic RNA Aptamers -- 5.1 Nucleic Acid: The Material of Choice for Nanotechnology -- 5.2 RNA Aptamers are Modular and Programmable Biosensing Units -- 5.3 Construction of RNA Nanoparticles with Integrated Logic Gate Operations Using Light-Up Aptamers -- 5.3.1 Implementation of MG-Binding RNA Aptamer to Design Binary Logic Gates -- 5.3.2 Implementation of MG-Binding RNA Aptamer and Broccoli RNA Aptamer to Design Half-Adder Circuit -- 5.4 Conclusion -- Acknowledgments -- References…”
    Format: Electronic eBook
    Full text (Wentworth users only)
  8. 158008

    Spatializing Blackness : architectures of confinement and Black masculinity in Chicago by Shabazz, Rashad, 1976-

    Urbana : University of Illinois Press, 2015
    Format: Book


  9. 158009

    Structural steel and castings : shapes and standards, properties, and applications

    Hauppauge, N.Y. : Nova Science Publishers, 2011
    Table of Contents: “…Steel Plate Shear Walls with Various Configurations of Infill Plate""""7.7. Use of Light-Gauge and Cold-Rolled Infill Panels""; ""7.8. …”
    Format: Electronic eBook
    Full text (Emerson users only)
    Full text (Emmanuel users only)
    Full text (NECO users only)
    Full text (MCPHS users only)
    Full text (Wentworth users only)
  10. 158010
  11. 158011

    Science of Cyber Security 5th International Conference, SciSec 2023, Melbourne, VIC, Australia, July 11–14, 2023, Proceedings

    Cham : Springer Nature Switzerland : Imprint: Springer, 2023
    1st ed. 2023.
    Table of Contents: “…Session 1 Network and System Security -- ACDroid: Detecting Collusion Applications on Smart Devices -- DomainIsolation: Lightweight Intra-enclave Isolation for Confidential Virtual Machines -- Keeping Your Enemies Closer: Shedding Light on the Attacker's Optimal Strategy -- Cyber Attacks against Enterprise Networks: Characterization, Modelling and Forecasting -- Session 2 Cryptography and Authentication -- MCVDSSE: Secure Multi-Client Verifiable Dynamic Symmetric Searchable Encryption -- A Graphical Password Scheme based on Rounded Image Selection -- Implementation of the Elliptic Curve Method -- Almost Injective and Invertible Encodings for Jacobi Quartic Curves -- SeeStar: an Efficient Starlink Asset Detection Framework -- Privacy-enhanced Anonymous and Deniable Post-Quantum X3DH -- Session 3 AI for Security -- Fractional Dynamic: Analysis for Network Malware Propagation -- Enhancing the Anti-steganalysis Ability via Multiple Adversarial Network -- An Empirical study of AI model’s Performance for Electricity Load Forecasting with Extreme Weather Conditions -- Session 4 Threat Detection and Analysis -- AST2Vec: A Robust Neural Code Representation for Malicious PowerShell Detection -- Real-time Aggregation for Massive alerts based on Dynamic Attack Granularity Graph -- Decompilation Based Deep Binary-Source Function Matching -- Event-based Threat Intelligence Ontology Model -- Session 5 Web and Privacy Security -- Optimally Blending Honeypots into Production Networks: Hardness and Algorithms -- WebMea: A Google Chrome Extension for Web Security and Privacy Measurement Studies -- Quantifying Psychological Sophistication of Malicious Emails -- SVFL: Secure Vertical Federated Learning on Linear Models -- Session 6: Cryptography and Authentication II -- Multiprime Strategies for Serial Evaluation of eSIDH-Like Isogenies -- Adaptively Secure Constrained Verifiable Random Function -- A Robust Reversible Data Hiding Algorithm Based on Polar Harmonic Fourier Moments -- Session 7: Advanced Threat Detection Techniques and Blockchain -- VaultBox: Enhancing the Security and Effectiveness of Security Analytics -- Two-stage Anomaly Detection in LEO Satellite Network -- Hydra: An Efficient Asynchronous DAG-based BFT Protocol -- Redactable Blockchain in the Permissioned Setting -- Session 8: Workshop Session -- A MULTI-LEVEL Sorting Prediction Enhancement-based two-dimensional Reversible Data Hiding Algorithm for Jpeg Images -- Research on Encrypted Malicious 5G Access Network Traffic identification based on Deep Learning -- A Design of Network Attack Detection Using Causal and Non-causal Temporal Convolutional.…”
    Format: Electronic eBook
    Full text (Wentworth users only)
  12. 158012
  13. 158013

    Retinopathy of prematurity : current diagnosis and management

    Cham, Switzerland : Springer, 2017
    Table of Contents: “…Contributors; 1 Pathophysiology of ROP; Retinal Vascular Development; Term Versus Preterm Birth; Oxygen; Oxygen Stresses and Oxidation; Oxygen Trials; Nutrition; Phases of ROP and Phases of Experimental Oxygen-Induced Retinopathy; Role of VEGF and Angiogenesis; Role of Anemia and Erythropoietin; Role of Oxidation, Inflammation, and Angiogenesis; VEGF Signaling; The Role of Light; Summary; References; 2 Classification of ROP; Zone; Stage; Plus Disease; Pre-threshold; Threshold; Early Treatment ROP Trial; References.…”
    Format: Electronic eBook
    Full text (Emerson users only)
    Full text (Emmanuel users only)
    Full text (NECO users only)
    Full text (MCPHS users only)
    Full text (Wentworth users only)
    Full text (Wentworth users only)
  14. 158014

    Seekers of the Face Secrets of the Idra Rabba (the Great Assembly) of the Zohar. by Hellner-Eshed, Melila

    Redwood City : Stanford University Press, 2021
    Table of Contents: “…The Face as a Fundamental Human Experience -- The Face as a Living Presence -- The Face as a Conduit and Filter of Light -- The Face as a Tiqqun -- The Face of God in Jewish Tradition -- Jewish Philosophy and the Idra Literature: Between Abstraction and Anthropomorphism -- Arikh Anpin: The Long-Faced, Patient One -- Ze'eir Anpin: The Small-Faced, Short-Tempered One -- The Divine Body: Male and Female -- The Chain of Divine Faces -- Chapter 3: The Gaze -- 'Attiqa's Gaze -- The Face's Healing -- Descriptions of the Gaze -- The Human Gaze -- Chapter 4: Reflections on Ze'eir Anpin…”
    Format: Electronic eBook
    Full text (Emmanuel users only)
    Full text (NECO users only)
    Full text (MCPHS users only)
    Full text (Wentworth users only)
  15. 158015
  16. 158016

    Phenomenological Neuropsychiatry How Patient Experience Bridges the Clinic with Clinical Neuroscience

    Cham : Springer International Publishing : Imprint: Springer, 2024
    1st ed. 2024.
    Format: Electronic eBook
    Full text (Wentworth users only)
  17. 158017
  18. 158018

    Volatile organic compounds

    New York : Nova Science Publishers, Inc., 2011
    Table of Contents: “…Photocatalytic Degradation of VOC Gases Considering Reactor Design for the Treatment of Decomposition Intermediates Using a Short Wavelength UV Light and Water DropletsAbstract; 1. Introduction; 2. …”
    Format: Electronic eBook
    Full text (Emerson users only)
    Full text (Emmanuel users only)
    Full text (NECO users only)
    Full text (MCPHS users only)
    Full text (Wentworth users only)
  19. 158019

    IMPEDANCE SPECTROSCOPY AND ITS APPLICATION IN BIOLOGICAL DETECTION

    BOCA RATON : CRC PRESS, 2023
    Format: Electronic eBook
    Full text (WIT users only)
  20. 158020