Books

Search Books...

Flaw Detection Books

Bioactive Natural Products Detection, Isolation, and Structural Determination

Author: Steven Colegate, Russell Molyneux

School: University of Ibadan

Department: Science and Technology

Course Code: CHE276

Topics: Bioactive Natural Products Detection, Bioactive Natural Products Isolation, Bioactive Natural Products Structural Determination, Nuclear Magnetic Resonance Spectroscopy, Alkaloids Enantiomeric Mixtures separation, Liquid Chromatography-Mass Spectrometry, High-Speed Countercurrent Chromatography, Anticancer Drug Discovery, Anticancer Drug Development, Naturally Occurring Glycosidase Inhibitors, Bioassay-Directed Isolation, Identification of Antiaflatoxigenic Constituents of Walnuts, Hen eggs bioactive peptides, Biological Fingerprinting Analysis, Germination Stimulant, Plant-Associated Toxins: Bioactivity-Guided Isolation

All Lecture notes on material science

Author: EGR201

School: University of Nigeria, Nsukka

Department: Engineering

Course Code: EGR201

Topics: material science, corrosion, forming process, sheet metalworking, metal forming, mechanical porperties, mechanical porperty testing, hardness test, Brinell hardness number, Vickers hardness number, diamond pyramid hardness, Rockwell hardness testing, tension test, fatique testing, creep testing, tensil test, radiography, magnetic particle inspection, magnetic particle crack detection, dye penetrant testing, ultrasonic flaw detection, eddy current, electro-magnetic methods, eddy current testing, non-destructive testing methods, magnetic properties

Radar Systems Peak Detection and Tracking

Author: Michael kolawole

School: Federal University of Technology, Owerri

Department: Engineering

Course Code: ENG 308

Topics: radar, radar systems, Fourier analysis, fast Fourier transform, antenna, antenna array, Tracking

Information Security Principles and Practice, 2nd Edition

Author: Mark Stamp

School: Edo University

Department: Science and Technology

Course Code: CMP318

Topics: information security, cryptography, access control, crypto, Codebook Cipher, Symmetric Key Crypto, block ciphers, Public Key Crypto, Elliptic Curve Cryptography, public key notation, Public Key Infrastructure, has functions, Advanced Cryptanalysis, Engima, Enigma Cipher Machine, authentication, biometrics, authorization, Access Control Matrix, Multilevel Security Models, firewalls, Intrusion Detection Systems, Simple Authentication Protocols, Authentication Protocols, Real-World Security Protocols, software flaws, malware, botnet, Digital Rights Management, Operating Systems, Operating Systems functions, Trusted Operating System

Modern Engine Blueprinting Techniques A Practical Guide to Precision Engine Building,Pro Series

Author: Mike Mavrigian

School: Federal University of Technology, Owerri

Department: Engineering

Course Code: ATE502

Topics: flaw detection, engine block, block machining, oiling system, engine math, crankshaft, connecting rod, piston, piston ring, camshaft, cylinder head, valve, spring, retainer, lock, rocker arm, pushrod, intake manifold, balancing, timing system, engine performance, coating

Immunodiagnosis of infection

Author: Immunology

School: University of Ilorin

Department: Medical, Pharmaceutical and Health science

Course Code: IMMUNOLOGY

Topics: Immunological tests, Antigen Detection, Microbial antigen detection, Meningococcal, Detection of Infection, malarial splenomegaly, Antibody, Cell-mediated immunity, Tuberculin test, Multiple puncture technique, Heaf test

Introduction to digital image processing

Author: William Pratt

School: National Open University of Nigeria

Department: Science and Technology

Course Code: CIT891

Topics: digital image processing, Continuous Image Mathematical Characterization, Continuous Image Characterization, light perception, eye physiology, visual phenomena, monochrome vision model, Photometry, Colorimetry, color matching, color spaces, image sampling, image reconstruction, Monochrome Image Sampling Systems, Monochrome Image Reconstruction Systems, Color Image Sampling Systems, image measurement, Discrete Image Mathematical Characterization, Vector-Space Image Representation, Generalized Two-Dimensional Linear Operator, Image Statistical Characterization, Image Probability Density Models, Linear Operator Statistical Representation, Finite-Area Superposition, Finite-Area Convolution, Sampled Image Superposition, Sampled Image Convolution, Circulant Superposition, circulant Convolution, General Unitary Transforms, Fourier transform, cosine transform, sine transform, Hartley transform, Hadamard Transforms, Haar Transforms, Daubechies Transforms, Karhunen–Loeve Transform, wavelet transforms, Linear Processing Techniques, Transform Domain Processing, Transform Domain Superposition, Fast Fourier Transform Convolution, Fourier Transform Filtering, image improvement, Image Enhancement, Contrast Manipulation, Histogram Modification, noise cleaning, Edge Crispening, Color Image Enhancement, Multispectral Image Enhancement, image restoration, image restoration models, Continuous Image Spatial Filtering Restoration, Pseudoinverse Spatial Image Restoration, Statistical Estimation Spatial Image Restoration, Multi-Plane Image Restoration, Geometrical Image Modification, Morphological Image Processing, binary image, Edge Detection, Image Feature Extraction, Image Segmentation, shape analysis, Image Detection, image Registration, Point Processing Image Compression, image compression, video compression, Spatial Processing Image Compression

Cybersecurity Fundamentals

Author: Kutub Thakur, Al-Sakib Khan Pathan

School: Air Force Institute of Technology

Department: Science and Technology

Course Code: CYB102

Topics: Cybersecurity, computers, network, computer networks, internet, internet protocols, internet infrastructure, cyberattacks, denial of service, distributed denial of service, man-in-the-middle attacks, cryptojacking, SQL injection, spamming, cyberterrorism, digital property misappropriation, zero-day exploitation, phishing, digital vandalism, cyberstalking, cyber frauds, cyber forgery, Equifax data theft, VPNfilter cyberattack, Wannacry ransom attack, peta cyberattack, US Election manipulation, power grid hacking, shadow network attack, GitHub DDos attack, under armor account hacking, computer malware, virus, trojan horse, rootkit, spyware, worms, adware, scareware, browser hijacker, computer firewall, antivirus software, anti-spyware software, anti-spam software, security updates, social engineering attack, password management, intrusion detection systems, multi-factor authentication, secure sockets layer, virtual private network, wireless network security, LAN vulnerabilities, secure online shopping, internet browsing, secure electronic transactions, web fraud detection systems, mobile security, mobile application management, cybersecurity standards, information security forum standards, payment card industry data security standard

Digital Logic Circuit Analysis and Design

Author: Victor Nelson, Troy Nagle, Bill Carroll, David Irwin

School: Edo University

Department: Engineering

Course Code: EEE314

Topics: Digital Logic Circuit Analysis, Digital Logic Circuit Design, computing, digital systems, number systems, positional notation, arithmetic, binary arithmetic, octal arithmetic, hexadecimal arithmetic, base conversions, signed number representation, computer codes, numeric codes, error detection codes, correction codes, Boolean algebra, Venn diagram, Duality, switching functions, truth tables, switching circuits, electronic logic gates, combinational circuits, algebraic methods, combinational logic circuits, computer aided design, design cycle, digital circuit modelling, design synthesis, logic simulation, Karnaugh maps, Quine-McCluskey tabular minimization method, Petrick's algorithm, computer aided minimization of switching functions. Modular combinational logic, Decodes, encoders, decoder circuit structures, encoders, multiplexers, demultiplexers, data distributors, adder circuits, comparators, semi custom logic devices, logic array circuits, field-programmable logic arrays, programmable read-only memory, programmable array logic, sequential devices, sequential circuits, memory devices, latches, flip-flops, timing circuits, modular sequential logic shift registers, counters, serial adder unit, serial accumulators, parallel accumulators, multiple-sequence counters, digital fractional rate multipliers, synchronous sequential circuit models, synchronous sequential circuits, registered programmable logic device, programmable gate arrays, sequential circuit design, logic circuit testing, digital logic circuit testing, combinational logic circuit testing, sequential logic circuit testing, electronic slot machine, keyless auto entry system

Introduction to medical laboratory science

Author: Bankole Henry Oladeinde

School: Edo University

Department: Medical, Pharmaceutical and Health science

Course Code: MLS211

Topics: medical laboratory science, microorganism, bacteria, virus, fungi, Protozoa, infection, infectious disease, Microscopy, Serological Technique, cultural method, biochemical tests, Nucleic acid detection, Polymerase Chain Reaction

Departments

Administration, Social and Management science image

Administration, Social and Management science

Agriculture and Veterinary Medicine image

Agriculture and Veterinary Medicine

Arts and Humanities image

Arts and Humanities

Education image

Education

Engineering image

Engineering

General studies image

General studies

Law image

Law

Medical, Pharmaceutical and Health science image

Medical, Pharmaceutical and Health science

Science and Technology image

Science and Technology