Flaw Detection Books
Bioactive Natural Products Detection, Isolation, and Structural Determination
Author: Steven Colegate, Russell Molyneux
School: University of Ibadan
Department: Science and Technology
Course Code: CHE276
Topics: Bioactive Natural Products Detection, Bioactive Natural Products Isolation, Bioactive Natural Products Structural Determination, Nuclear Magnetic Resonance Spectroscopy, Alkaloids Enantiomeric Mixtures separation, Liquid Chromatography-Mass Spectrometry, High-Speed Countercurrent Chromatography, Anticancer Drug Discovery, Anticancer Drug Development, Naturally Occurring Glycosidase Inhibitors, Bioassay-Directed Isolation, Identification of Antiaflatoxigenic Constituents of Walnuts, Hen eggs bioactive peptides, Biological Fingerprinting Analysis, Germination Stimulant, Plant-Associated Toxins: Bioactivity-Guided Isolation
All Lecture notes on material science
Author: EGR201
School: University of Nigeria, Nsukka
Department: Engineering
Course Code: EGR201
Topics: material science, corrosion, forming process, sheet metalworking, metal forming, mechanical porperties, mechanical porperty testing, hardness test, Brinell hardness number, Vickers hardness number, diamond pyramid hardness, Rockwell hardness testing, tension test, fatique testing, creep testing, tensil test, radiography, magnetic particle inspection, magnetic particle crack detection, dye penetrant testing, ultrasonic flaw detection, eddy current, electro-magnetic methods, eddy current testing, non-destructive testing methods, magnetic properties
Radar Systems Peak Detection and Tracking
Author: Michael kolawole
School: Federal University of Technology, Owerri
Department: Engineering
Course Code: ENG 308
Topics: radar, radar systems, Fourier analysis, fast Fourier transform, antenna, antenna array, Tracking
Information Security Principles and Practice, 2nd Edition
Author: Mark Stamp
School: Edo University
Department: Science and Technology
Course Code: CMP318
Topics: information security, cryptography, access control, crypto, Codebook Cipher, Symmetric Key Crypto, block ciphers, Public Key Crypto, Elliptic Curve Cryptography, public key notation, Public Key Infrastructure, has functions, Advanced Cryptanalysis, Engima, Enigma Cipher Machine, authentication, biometrics, authorization, Access Control Matrix, Multilevel Security Models, firewalls, Intrusion Detection Systems, Simple Authentication Protocols, Authentication Protocols, Real-World Security Protocols, software flaws, malware, botnet, Digital Rights Management, Operating Systems, Operating Systems functions, Trusted Operating System
Modern Engine Blueprinting Techniques A Practical Guide to Precision Engine Building,Pro Series
Author: Mike Mavrigian
School: Federal University of Technology, Owerri
Department: Engineering
Course Code: ATE502
Topics: flaw detection, engine block, block machining, oiling system, engine math, crankshaft, connecting rod, piston, piston ring, camshaft, cylinder head, valve, spring, retainer, lock, rocker arm, pushrod, intake manifold, balancing, timing system, engine performance, coating
Author: Immunology
School: University of Ilorin
Department: Medical, Pharmaceutical and Health science
Course Code: IMMUNOLOGY
Topics: Immunological tests, Antigen Detection, Microbial antigen detection, Meningococcal, Detection of Infection, malarial splenomegaly, Antibody, Cell-mediated immunity, Tuberculin test, Multiple puncture technique, Heaf test
Introduction to digital image processing
Author: William Pratt
School: National Open University of Nigeria
Department: Science and Technology
Course Code: CIT891
Topics: digital image processing, Continuous Image Mathematical Characterization, Continuous Image Characterization, light perception, eye physiology, visual phenomena, monochrome vision model, Photometry, Colorimetry, color matching, color spaces, image sampling, image reconstruction, Monochrome Image Sampling Systems, Monochrome Image Reconstruction Systems, Color Image Sampling Systems, image measurement, Discrete Image Mathematical Characterization, Vector-Space Image Representation, Generalized Two-Dimensional Linear Operator, Image Statistical Characterization, Image Probability Density Models, Linear Operator Statistical Representation, Finite-Area Superposition, Finite-Area Convolution, Sampled Image Superposition, Sampled Image Convolution, Circulant Superposition, circulant Convolution, General Unitary Transforms, Fourier transform, cosine transform, sine transform, Hartley transform, Hadamard Transforms, Haar Transforms, Daubechies Transforms, Karhunen–Loeve Transform, wavelet transforms, Linear Processing Techniques, Transform Domain Processing, Transform Domain Superposition, Fast Fourier Transform Convolution, Fourier Transform Filtering, image improvement, Image Enhancement, Contrast Manipulation, Histogram Modification, noise cleaning, Edge Crispening, Color Image Enhancement, Multispectral Image Enhancement, image restoration, image restoration models, Continuous Image Spatial Filtering Restoration, Pseudoinverse Spatial Image Restoration, Statistical Estimation Spatial Image Restoration, Multi-Plane Image Restoration, Geometrical Image Modification, Morphological Image Processing, binary image, Edge Detection, Image Feature Extraction, Image Segmentation, shape analysis, Image Detection, image Registration, Point Processing Image Compression, image compression, video compression, Spatial Processing Image Compression
Author: Kutub Thakur, Al-Sakib Khan Pathan
School: Air Force Institute of Technology
Department: Science and Technology
Course Code: CYB102
Topics: Cybersecurity, computers, network, computer networks, internet, internet protocols, internet infrastructure, cyberattacks, denial of service, distributed denial of service, man-in-the-middle attacks, cryptojacking, SQL injection, spamming, cyberterrorism, digital property misappropriation, zero-day exploitation, phishing, digital vandalism, cyberstalking, cyber frauds, cyber forgery, Equifax data theft, VPNfilter cyberattack, Wannacry ransom attack, peta cyberattack, US Election manipulation, power grid hacking, shadow network attack, GitHub DDos attack, under armor account hacking, computer malware, virus, trojan horse, rootkit, spyware, worms, adware, scareware, browser hijacker, computer firewall, antivirus software, anti-spyware software, anti-spam software, security updates, social engineering attack, password management, intrusion detection systems, multi-factor authentication, secure sockets layer, virtual private network, wireless network security, LAN vulnerabilities, secure online shopping, internet browsing, secure electronic transactions, web fraud detection systems, mobile security, mobile application management, cybersecurity standards, information security forum standards, payment card industry data security standard
Digital Logic Circuit Analysis and Design
Author: Victor Nelson, Troy Nagle, Bill Carroll, David Irwin
School: Edo University
Department: Engineering
Course Code: EEE314
Topics: Digital Logic Circuit Analysis, Digital Logic Circuit Design, computing, digital systems, number systems, positional notation, arithmetic, binary arithmetic, octal arithmetic, hexadecimal arithmetic, base conversions, signed number representation, computer codes, numeric codes, error detection codes, correction codes, Boolean algebra, Venn diagram, Duality, switching functions, truth tables, switching circuits, electronic logic gates, combinational circuits, algebraic methods, combinational logic circuits, computer aided design, design cycle, digital circuit modelling, design synthesis, logic simulation, Karnaugh maps, Quine-McCluskey tabular minimization method, Petrick's algorithm, computer aided minimization of switching functions. Modular combinational logic, Decodes, encoders, decoder circuit structures, encoders, multiplexers, demultiplexers, data distributors, adder circuits, comparators, semi custom logic devices, logic array circuits, field-programmable logic arrays, programmable read-only memory, programmable array logic, sequential devices, sequential circuits, memory devices, latches, flip-flops, timing circuits, modular sequential logic shift registers, counters, serial adder unit, serial accumulators, parallel accumulators, multiple-sequence counters, digital fractional rate multipliers, synchronous sequential circuit models, synchronous sequential circuits, registered programmable logic device, programmable gate arrays, sequential circuit design, logic circuit testing, digital logic circuit testing, combinational logic circuit testing, sequential logic circuit testing, electronic slot machine, keyless auto entry system
Introduction to medical laboratory science
Author: Bankole Henry Oladeinde
School: Edo University
Department: Medical, Pharmaceutical and Health science
Course Code: MLS211
Topics: medical laboratory science, microorganism, bacteria, virus, fungi, Protozoa, infection, infectious disease, Microscopy, Serological Technique, cultural method, biochemical tests, Nucleic acid detection, Polymerase Chain Reaction
Departments
Administration, Social and Management science
Agriculture and Veterinary Medicine
Arts and Humanities
Education
Engineering
General studies
Law
Medical, Pharmaceutical and Health science
Science and Technology