01793oam 2200493Ia 450 991070193290332120120917104608.0(CKB)5470000002422791(OCoLC)801820435(EXLCZ)99547000000242279120120726d1987 ua 0engurbn|||||||||txtrdacontentcrdamediacrrdacarrierBoundary layer simulation improvement[electronic resource]progress report /prepared by Sarat C. PraharajHuntsville, Ala. :Remtech, inc. ;Marshall Space Flight Center, Ala. :National Aeronautics and Space Administration, George C. Marshall Space Flight Center,[1987]1 online resource (15 pages) illustrations[NASA contractor report] ;178845Title from title screen (viewed on July 26, 2012)."10 June 1987."Includes bibliographical references (page 14).Boundary layer simulation improvement Boundary layer flownasatComputer programsnasatComputer systems performancenasatComputerized simulationnasatTurbulent boundary layernasatBoundary layer flow.Computer programs.Computer systems performance.Computerized simulation.Turbulent boundary layer.Praharaj Sarat C1418258George C. Marshall Space Flight Center.Remtech, inc.GPOGPOGPOBOOK9910701932903321Boundary layer simulation improvement3529122UNINA03950 am 2201057 n 450 9910306638303321201901112-7099-2611-310.4000/books.irdeditions.26421(CKB)4100000007522745(FrMaCLE)OB-irdeditions-26421(oapen)https://directory.doabooks.org/handle/20.500.12854/62875(PPN)267950810(EXLCZ)99410000000752274520190117j|||||||| ||| 0spauu||||||m||||txtrdacontentcrdamediacrrdacarrierYato' ramuesh : plantas medicinales yaneshas Yato' ramuesh : pare'shemats yanesha /Geneviève Bourdy, Céline Valadeau, Joaquina Albán CastilloMarseille IRD Éditions20191 online resource (345 p.) 2-7099-1658-4 En este libro, los yaneshas, una población de la Amazonía peruana, comparten sus conocimientos sobre sus plantas y sus variados usos medicinales. ¿Cuáles se utilizan para aliviar el dolor de cabeza?, ¿cómo curar la gripe?, ¿qué dieta debe seguir una persona que ha sido mordida por una serpiente?, ¿cómo hacerse querer por alguien? Además, nos narran otros usos cotidianos: ¿qué árboles permiten teñir los hilos de algodón para hacer las cushmas?, ¿cómo sembrar la yuca para que crezca bien? Estas son algunas preguntas a las cuales el libro ofrece respuestas. He aquí la sistematización de tres años de trabajo con la nación Yanesha, que nos hace descubrir su riqueza cultural mediante la descripción de los usos de sus plantas, a la vez que ofrece al lector un amplio panorama de sus vastos conocimientos tradicionales.Yato' ramueshYato' ramuesh EconomicsPlanning & DevelopmentPéroumaladiesociété traditionnelleplante utileplante médicinaleethnobotaniquecommunauté amérindienneherbiersavoir-faire thérapeutiqueusage thérapeutiquecomunidad amerindiaetnobotánicaherbarioenfermedadPerúplanta medicinalplanta útilconocimiento terapéuticosociedad tradicionaluso terapéuticoetnobotánicaenfermedaduso terapéuticosociedad tradicionalPerúplanta medicinalcomunidad amerindiaconocimiento terapéuticoherbarioplanta útilEconomicsPlanning & DevelopmentPéroumaladiesociété traditionnelleplante utileplante médicinaleethnobotaniquecommunauté amérindienneherbiersavoir-faire thérapeutiqueusage thérapeutiquecomunidad amerindiaetnobotánicaherbarioenfermedadPerúplanta medicinalplanta útilconocimiento terapéuticosociedad tradicionaluso terapéuticoBourdy Geneviève1323775Valadeau Céline1323776Albán Castillo Joaquina1323777Entazú Pablo Espíritu1323778López Katalina1323779FR-FrMaCLEBOOK9910306638303321Yato' ramuesh : plantas medicinales yaneshas3035840UNINA03988nam 22006375 450 991089018920332120250807145417.09789819737451981973745110.1007/978-981-97-3745-1(MiAaPQ)EBC31692519(Au-PeEL)EBL31692519(CKB)36231087800041(Exl-AI)31692519(DE-He213)978-981-97-3745-1(EXLCZ)993623108780004120240928d2024 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierEmerging Trends in Expert Applications and Security Proceedings of ICE-TEAS 2024, Volume 1 /edited by Vijay Singh Rathore, João Manuel R. S. Tavares, Eva Tuba, Vladan Devedzic1st ed. 2024.Singapore :Springer Nature Singapore :Imprint: Springer,2024.1 online resource (421 pages)Lecture Notes in Networks and Systems,2367-3389 ;10309789819737444 9819737443 Preface -- Acknowledgements -- About This Book -- Contents -- Editors and Contributors -- Applications and Challenges of Machine Learning (ML) in Cyber Security -- 1 Introduction -- 2 Application of ML in Cybersecurity -- 2.1 Cyberthreat Identification and Security -- 2.2 AI-Based Software for Virus Detection -- 2.3 Behavior Modeling -- 2.4 Fighting AI-Based Threats -- 2.5 Network Intrusion Detection -- 2.6 Monitoring of Emails -- 2.7 Malware Detection and Classification -- 2.8 Watering Hole -- 2.9 Remote Exploitation -- 3 Challenges -- 4 Conclusion -- References -- Detection of Sleep Apnea Using Vital Parameters and Continuous Monitoring Using Cloud Storage -- 1 Introduction -- 1.1 Characteristics of Embedded Systems -- 1.2 Application Specific Systems -- 1.3 Reactive Systems -- 2 Related Works -- 2.1 Public M-Health Service Realization in the License-Free Spectrum -- 2.2 A Decentralized Plan for the Control of the Interactions Between Base-Based Health Monitoring UAVS -- 2.3 How Well a Multi-Tier Wireless Network Monitors Health Care -- 2.4 In Regard to the Levy-Walk Nature of Human Mobility, in the IEEE/ACM TORNGenerated by AI.The book covers current developments in the field of computer system security using cryptographic algorithms and other security schemes for system as well as cloud. The proceedings compiles the selected research papers presented at ICE-TEAS 2024 Conference held at Jaipur Engineering College and Research Centre, Jaipur, India, during March 15–17, 2024. The book focuses on expert applications and artificial intelligence; information and application security; advanced computing; multimedia applications in forensics, security, and intelligence; and advances in web technologies: implementation and security issues.Lecture Notes in Networks and Systems,2367-3389 ;1030Computational intelligenceData protectionArtificial intelligenceComputational IntelligenceData and Information SecurityArtificial IntelligenceComputational intelligence.Data protection.Artificial intelligence.Computational Intelligence.Data and Information Security.Artificial Intelligence.005.8Rathore Vijay Singh1733795Manuel R. S. Tavares João1771748Tuba Eva1769412Devedzic Vladan1373189MiAaPQMiAaPQMiAaPQBOOK9910890189203321Emerging Trends in Expert Applications and Security4264225UNINA