James is a published author with multiple pop-history and science books to his name. He specializes in history, space, strange science, and anything out of the ordinary.View full profile James is a ...
Abstract: In this paper, we propose a new wideband digital receiver based on the modulated wideband converter (MWC) discrete compressed sampling (CS) structure, and we further propose a uniform linear ...
Cultural and Archaeological Implications of Monumental Shadow Interactions in the Bosnian Valley of the Pyramids Large-scale ...
Danquah, P. and Bekoe, S. (2026) Cyber Deception and Theft: A Critical Review. Journal of Information Security, 17, 149-166.
When William conquered England, he had a limited knowledge of people’s wealth and property in the country. He was concerned about potential invasions and attacks from enemies, and needed to raise ...
Abstract: Recent work in structure from motion (SfM) has built 3D models from large collections of images downloaded from the Internet. Many approaches to this problem use incremental algorithms that ...
This book aims to provide a detailed introduction to the state-of-the-art covariant density functional theory, which follows the Lorentz invariance from the very beginning and is able to describe ...
Introduction to algorithmic problem solving and computer programming. Designed to provide a foundation for further studies in computer science. Introduction to programming and computer science with ...
Customer stories Events & webinars Ebooks & reports Business insights GitHub Skills ...
Ask the publishers to restore access to 500,000+ books. An icon used to represent a menu that can be toggled by interacting with this icon. A line drawing of the Internet Archive headquarters building ...
Customer stories Events & webinars Ebooks & reports Business insights GitHub Skills ...