Mahima Publications
  • Home
  • Books
  • About Us
  • Contact Us
BROWSE BY

Subject

  • - Integrative Life Sciences

  • - Sociology, Culture, and Society

  • - Pure and Applied Mathematics

  • - Pure and Applied Chemistry

  • - Psychological Sciences

  • - Plant Biology and Agriculture

  • - Philosophy: Ethics and Humanities

  • - Pharmacology and Pharmaceutical Sciences

  • - Medical Research and Practice

  • - Media Studies and Journalism

  • - Mechanical and Industrial Systems Engineering

  • - Law and Forensics

  • - Classical and Modern Physics

  • - History, Heritage and Archaeology

  • - Governance, Politics and Policy Studies

  • - Food, Health and Nutrition Studies

  • - Finance, Business and Economics

  • - Electronic and Communication Technologies & Power Engineering

  • - Educational Learning, Academic Policy and Curriculcum Development

  • - Ecology and Environmental Science

  • - Earth, Geography and Geological Sciences

  • - Construction and Civil Engineering

  • - Computer and IT: Science and Engineering

Author

Featured Books Showing 4021 to 4032 of 4253 Results
Applied Safety Critical Control
By Anuj Ban
Applications of Machine Learning to Finite Volume Methods
By Hetvi Karnad
Applications of Machine Learning in Microbial Forensics
By Naba Dave
Application Programming Interface for Embedded Protocol Management System
By Rohit Sawant
Application of Reinforcement Learning Yields More Robust Data Breach Controls for Working from Home
By Deepthi Baruah
ApolloSim: A Lidar Simulator With Calibrated Sensor Noise
By Vijay Saxena
Apollo: End-to-end Verifiable Internet Voting with Recovery from Vote Manipulation
By Anuja Deshpande
Analyzing the Efficacy of Microsoft Presidio in Identifying Social Security Numbers in Unstructured Text
By Advait Jolly
Analyzing Indo-European Language Similarities Using Document Vectors
By Harsh Parmar
Analyzing Consumer’s Awareness of Protecting Personally Identifiable Information on Android Smartphones
By Sandhya Grover
Analysis of Keystroke Dynamics Algorithms with Feedforward Neural Networks
By Anamika Banerjee
Analysis of Failed SSH Attempts for Intrusion Detection
By Ambika Acharya
  • «
  • 1
  • 2
  • ...
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • ...
  • 354
  • 355
  • »

Mahima Publications

  Home

 About Us

 Contact Us

 Terms & Conditions

 Faq

 Contact Us