4,530 results on '"Jones, Keith"'
Search Results
2. A Time of Plague: Allegory, Seriality, and Historicity in Samuel R. Delany's Return to Νevèrÿon
3. Chapter Bayes Theory as a Methodological Approach to Assess the Impact of Location Variables of Hyperscale Data Centres: Testing a Concept
4. Chapter A Systematic Literature Review to Identify a Methodological Approach for Use in the Modelling and Forecasting of Capital Expenditure of Hyperscale Data Centres
5. John Laurance and the Role of Military Justice at Valley Forge
6. The Performance of Sequential Deep Learning Models in Detecting Phishing Websites Using Contextual Features of URLs
7. Immediate effects of propofol on mood: a randomized comparison of two doses in a cohort with depression
8. Shakespeare on Screen: “Macbeth.” ed. by Sarah Hatchuel, Nathalie Vienne-Guerrin, and Victoria Bladen, and: Screen Adaptations: Shakespeare’s “Hamlet.” The Relationship between Text and Film by Samuel Crowl (review)
9. Shock-induced chemistry and high strain-rate viscoelastic behavior of a phenolic polymer.
10. Thoracic Outlet Syndrome, United Kingdom: A Retrospective Review of Practice
11. Abstract 4141112: Identifying Gaps in Screening&Treatment for Peripheral Artery Disease (Pad): A Survey on Provider Knowledge, Attitudes, and Practices
12. REPAIRS Delphi: A UK and Ireland Consensus Statement on the Management of Infected Arterial Pseudoaneurysms Secondary to Groin Injecting Drug Use
13. 21. The History and Politics of Krip-Hop
14. Toward Explainable Users: Using NLP to Enable AI to Understand Users' Perceptions of Cyber Attacks
15. Opportunities Beyond the Anesthesiology Department: Broader Impact Through Broader Thinking.
16. Phishing Detection through Email Embeddings
17. Predicting Emotions Perceived from Sounds
18. Cyber-Attack Consequence Prediction
19. Fake Reviews Detection through Analysis of Linguistic Features
20. Fake Reviews Detection through Ensemble Learning
21. Cloud as an Attack Platform
22. Launching Stealth Attacks using Cloud
23. Amputation Above the Ankle: Achieving the Best Outcome for the Patient
24. A Delphi Pilot Study to Assess the Impact of Location Factors for Hyperscale Data Centres
25. Cost–benefit analysis to appraise technical mitigation options for earthquake-induced liquefaction disaster events
26. Surgical Techniques of, and Outcomes after, Distal Muscle Stabilization in Transfemoral Amputation: A Systematic Review and Narrative Synthesis
27. Parallel Reordering and Transfer of Data Between Partitioned Memories of Discrete Hartley Transform Discrete Hartley transform (DHT) for 1-D and m-D Cases
28. Computation of Common DSP-Based Functions Using Regularized Fast Hartley Transform Fast Hartley transform (FHT)
29. Architectures for Silicon-Based Implementation of m-D Discrete Hartley Transform Discrete Hartley transform (DHT) Using Regularized Fast Hartley Transform Fast Hartley transform (FHT)
30. Summary and Conclusions
31. The Real-Data Discrete Fourier Transform Discrete Fourier transform (DFT)
32. Design of CORDIC-Based Processing Element Processing element (PE) for Regularized Fast Hartley Transform Fast Hartley transform (FHT)
33. Derivation of Radix-2 Real-Data Fast Fourier Transform Fast Fourier transform (FFT) Algorithms Using Regularized Fast Hartley Transform Fast Hartley transform (FHT)
34. Derivation of Regularized Formulation of Fast Hartley Transform Fast Hartley transform (FHT)
35. Design Strategy for Silicon-Based Implementation of Regularized Fast Hartley Transform Fast Hartley transform (FHT)
36. Architecture for Silicon-Based Implementation of Regularized Fast Hartley Transform Fast Hartley transform (FHT)
37. Background to Research
38. The Discrete Hartley Transform Discrete Hartley transform (DHT)
39. Generating Mathematical Knowledge in the Classroom through Proof, Refutation, and Abductive Reasoning
40. On the asymmetry of stars at infinity
41. Can Educators Prevent a 'Wild West' Scenario in Giving Online Exams?
42. A quiet revolution
43. Grouping and Determining Perceived Severity of Cyber-Attack Consequences: Gaining Information Needed to Sonify Cyber-Attacks
44. JOHN LAURANGE: The Immigrant Founding Father America Never Knew
45. The Association between Students' Style of Learning Preferences, Social Presence, Collaborative Learning and Learning Outcomes
46. How do non experts think about cyber attack consequences?
47. The Sounds of Cyber Threats
48. A Systematic Literature Review to Identify a Methodological Approach for Use in the Modelling and Forecasting of Capital Expenditure of Hyperscale Data Centres
49. Bayes Theory as a Methodological Approach to Assess the Impact of Location Variables of Hyperscale Data Centres: Testing a Concept
50. A Delphi Pilot Study to Assess the Impact of Location Factors for Hyperscale Data Centres
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.