Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

The Mathematics and Topology of Fullerenes
  • Language: en
  • Pages: 294

The Mathematics and Topology of Fullerenes

The Mathematics and Topology of Fullerenes presents a comprehensive overview of scientific and technical innovations in theoretical and experimental studies. Topics included in this multi-author volume are: Clar structures for conjugated nanostructures; counting polynomials of fullerenes; topological indices of fullerenes; the wiener index of nanotubes; toroidal fullerenes and nanostars; C60 Structural relatives: a topological study; local combinatorial characterization of fullerenes; computation of selected topological indices of C60 and C80 Fullerenes via the Gap Program; 4valent- analogues of fullerenes; a detailed atlas of Kekule structures of C60. The Mathematics and Topology of Fullerenes is targeted at advanced graduates and researchers working in carbon materials, chemistry and physics.

The High-risk Surgical Patient
  • Language: en
  • Pages: 952

The High-risk Surgical Patient

It is well known that certain diseases and patient conditions are associated with increased perioperative risk. The aim of this book is to define and identify the clinical factors that warrant a broader and more detailed assessment of pre-operative surgical risk in difficult and unusual clinical settings. One of the sections is dedicated to the main pathway of peri- and post-surgical critical care based on the patient-specific deterioration risk and associated diseases; here, a panel of selected experts describes the correct patient-oriented pathways for complex or unscheduled surgical operations in order to reduce the operative risk. In addition, the book describes the latest trends in mini...

The Verona Exchange, a Rainee Allen mystery
  • Language: en
  • Pages: 242

The Verona Exchange, a Rainee Allen mystery

A surprise phone call sets author and amateur sleuth Rainee Allen on an unexpected journey. Joshua, the son she never got to know, wants to meet her. However, her excitement is short-lived when a terrorist group intervenes. With only her intuition to guide her, Rainee Allen finds herself embroiled in a multi-city search that has Italy's infamous Red Brigade, Interpol, and Rome's police brought together in a cat-and-mouse game putting her in dire circumstances. Rainee Allen is no stranger to suspense and intrigue. This time it's personal and she's in it for blood. Award-winning author Lauren B. Grossman and Bernard Jaroslow collaborated on this new Rainee Allen mystery.

The Electrical Engineer
  • Language: en
  • Pages: 742

The Electrical Engineer

  • Type: Book
  • -
  • Published: 1897
  • -
  • Publisher: Unknown

None

Kona
  • Language: en
  • Pages: 262

Kona

  • Type: Book
  • -
  • Published: 2006
  • -
  • Publisher: Unknown

None

Information Security and Cryptology - ICISC 2010
  • Language: en
  • Pages: 447

Information Security and Cryptology - ICISC 2010

This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology, held in Seoul, Korea, in December 2010. The 28 revised full papers presented were carefully selected from 99 submissions during two rounds of reviewing. The conference provides a forum for the presentation of new results in research, development, and applications in the field of information security and cryptology. The papers are organized in topical sections on cryptanalysis, cryptographic algorithms, implementation, network and mobile security, symmetric key cryptography, cryptographic protocols, and side channel attack.

Safety and Security of Cyber-Physical Systems
  • Language: en
  • Pages: 559

Safety and Security of Cyber-Physical Systems

Cyber-physical systems (CPSs) consist of software-controlled computing devices communicating with each other and interacting with the physical world through sensors and actuators. Because most of the functionality of a CPS is implemented in software, the software is of crucial importance for the safety and security of the CPS. This book presents principle-based engineering for the development and operation of dependable software. The knowledge in this book addresses organizations that want to strengthen their methodologies to build safe and secure software for mission-critical cyber-physical systems. The book: • Presents a successful strategy for the management of vulnerabilities, threats, and failures in mission-critical cyber-physical systems; • Offers deep practical insight into principle-based software development (62 principles are introduced and cataloged into five categories: Business & organization, general principles, safety, security, and risk management principles); • Provides direct guidance on architecting and operating dependable cyber-physical systems for software managers and architects.

The Official journal of the Patent Office
  • Language: en
  • Pages: 1110

The Official journal of the Patent Office

  • Type: Book
  • -
  • Published: 1887
  • -
  • Publisher: Unknown

None

Insights in Coronavirus Disease (COVID-19) - Surveillance, Prevention and Treatment
  • Language: en
  • Pages: 863
Malware Analysis Using Artificial Intelligence and Deep Learning
  • Language: en
  • Pages: 655

Malware Analysis Using Artificial Intelligence and Deep Learning

​This book is focused on the use of deep learning (DL) and artificial intelligence (AI) as tools to advance the fields of malware detection and analysis. The individual chapters of the book deal with a wide variety of state-of-the-art AI and DL techniques, which are applied to a number of challenging malware-related problems. DL and AI based approaches to malware detection and analysis are largely data driven and hence minimal expert domain knowledge of malware is needed. This book fills a gap between the emerging fields of DL/AI and malware analysis. It covers a broad range of modern and practical DL and AI techniques, including frameworks and development tools enabling the audience to innovate with cutting-edge research advancements in a multitude of malware (and closely related) use cases.