Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Construction Project Management
  • Language: en
  • Pages: 706

Construction Project Management

Construction Project Management deals with different facets of construction management emphasizing the basic concepts that any engineering student is supposed to know. The major principles of project management have been derived through real life case studies from the field. Simplified examples have been used to facilitate better understanding of the concepts before going into the large and complex problems. The book features computer applications (Primavera and MS Project) used to explain planning, scheduling, resource leveling, monitoring and reporting; it is highly illustrated with line dia.

Construction Project Management
  • Language: en
  • Pages: 904

Construction Project Management

The revised second edition of Construction Project Management discusses the various facets of construction project management with a special emphasis on the fundamental concepts. The major principles of project management are explained with the help of real-life case studies. Simple examples are used to facilitate the better understanding of basic concepts before complex problems are discussed.

A Cop in Cricket
  • Language: en

A Cop in Cricket

This is an eye-opening and shocking insider's account of the rot within Indian cricket.

Dial D for Don
  • Language: en
  • Pages: 288

Dial D for Don

  • Type: Book
  • -
  • Published: 2015-11-25
  • -
  • Publisher: Penguin UK

March 1993. Mumbai was rocked by a series of bomb blasts. Unknown to most, Dawood Ibrahim, the mastermind behind the terror attack, had made several calls to the CBI. The don was desperate to prove his ‘innocence’ by giving himself up, but with conditions. October 1999. The world’s very first case of cricket match-fixing led to the banning of six top Indian cricketers, including the then team captain. It was only in 2013, after the then commissioner of police revived the case, that a charge sheet was filed in a court of law. January 2002. Aftab Ansari—a notorious Dubai-based don responsible for kidnapping a shoe baron in 2001 with the help of Jihadi groups in Pakistan—was arrested ...

Indian Revolutionaries Reading List Part 1 : Biography of Batukeshwar Dutt/Biography of Shaheed Udham Singh/Biography of Lala Hardayal/Biography of Ras Behari Bose/Biography of Khudiram Bose/Biography of Madanlal Dhingra
  • Language: en
  • Pages: 118

Indian Revolutionaries Reading List Part 1 : Biography of Batukeshwar Dutt/Biography of Shaheed Udham Singh/Biography of Lala Hardayal/Biography of Ras Behari Bose/Biography of Khudiram Bose/Biography of Madanlal Dhingra

Indian Revolutionaries Reading List Part 1 by Kumkum Khanna, Sumit Kumar, Neeraj, S.K. Agrawal: This captivating collection of biographies delves into the lives of six brave Indian revolutionaries who played pivotal roles in the struggle for India's independence. From Batukeshwar Dutt, who took part in the famous Central Legislative Assembly bombing, to Shaheed Udham Singh, the avenger of Jallianwala Bagh massacre, and Lala Hardayal, a prominent Ghadar Party leader, this book explores the courage, sacrifices, and determination of these revolutionaries in their fight against British colonial rule. Key Aspects of the Book "Indian Revolutionaries Reading List Part 1": Batukeshwar Dutt: The book...

Using Event-B for Critical Device Software Systems
  • Language: en
  • Pages: 335

Using Event-B for Critical Device Software Systems

Defining a new development life-cycle methodology, together with a set of associated techniques and tools to develop highly critical systems using formal techniques, this book adopts a rigorous safety assessment approach explored via several layers (from requirements analysis to automatic source code generation). This is assessed and evaluated via a standard case study: the cardiac pacemaker. Additionally a formalisation of an Electrocardiogram (ECG) is used to identify anomalies in order to improve existing medical protocols. This allows the key issue - that formal methods are not currently integrated into established critical systems development processes - to be discussed in a highly effective and informative way. Using Event-B for Critical Device Software Systems serves as a valuable resource for researchers and students of formal methods. The assessment of critical systems development is applicable to all industries, but engineers and physicians from the health domain will find the cardiac pacemaker case study of particular value.

Current Research Trends and Applications in Waste Management
  • Language: en
  • Pages: 398

Current Research Trends and Applications in Waste Management

This book covers latest information on organic and inorganic waste management, and how the waste can be utilized as an energy source. An increasing world population and climate change rate hint that environmental health needs a sustainable waste recycling system worldwide. Management of wastes material plays a substantial role in the environment and climate regulation. Chapters contain modern tools and techniques for managing inorganic, biomedical, municipality, and food waste. The title covers the role of contemporary microbiology and biotechnological tools in waste management and how these microbial agents can enhance waste degradation and bioenergy production. The book covers interesting topics such as bio-ethanol production from agro-waste, microbial fuel cells, biogas production from animal waste, nanotechnology in waste recycling, etc. The primary audiences are researchers, scientists, students, and policymakers interlinked with waste management and applied microbial sectors. ​

Limitations and Future Applications of Quantum Cryptography
  • Language: en
  • Pages: 305

Limitations and Future Applications of Quantum Cryptography

  • Type: Book
  • -
  • Published: 2020-12-18
  • -
  • Publisher: IGI Global

The concept of quantum computing is based on two fundamental principles of quantum mechanics: superposition and entanglement. Instead of using bits, qubits are used in quantum computing, which is a key indicator in the high level of safety and security this type of cryptography ensures. If interfered with or eavesdropped in, qubits will delete or refuse to send, which keeps the information safe. This is vital in the current era where sensitive and important personal information can be digitally shared online. In computer networks, a large amount of data is transferred worldwide daily, including anything from military plans to a country’s sensitive information, and data breaches can be disa...

Just Tap & Calm Your Mind
  • Language: en
  • Pages: 113

Just Tap & Calm Your Mind

  • Type: Book
  • -
  • Published: 2023-07-11
  • -
  • Publisher: Notion Press

A simple and powerful technique is explained to revive and rejuvenate life. This book aims to solve your emotional problems, physical pain and relationship conflicts. The technique described in this book will bring you into the actual realm of life and you will experience a bounce back to life. Also, it will bring awareness and understanding of problems and their root causes. You will learn to deal with various psychological problems like depression, anxiety, panic attacks, fear (of exams, height, the lift, water, reptiles, etc.), grief, overthinking, repetitive thoughts and insomnia (sleeplessness). In addition, you will learn how to apply numerous methods of the EFT. Moreover, you will be introduced to the challenges that may arise during tapping. This book contains step-by-step instructions, exercises and diagrams. Also, you will find unbelievable real-life stories of healing.

Implementing Data Analytics and Architectures for Next Generation Wireless Communications
  • Language: en
  • Pages: 227

Implementing Data Analytics and Architectures for Next Generation Wireless Communications

  • Type: Book
  • -
  • Published: 2021-08-13
  • -
  • Publisher: IGI Global

Wireless communication is continuously evolving to improve and be a part of our daily communication. This leads to improved quality of services and applications supported by networking technologies. We are now able to use LTE, LTE-Advanced, and other emerging technologies due to the enormous efforts that are made to improve the quality of service in cellular networks. As the future of networking is uncertain, the use of deep learning and big data analytics is a point of focus as it can work in many capacities at a variety of levels for wireless communications. Implementing Data Analytics and Architectures for Next Generation Wireless Communications addresses the existing and emerging theoret...