Donazioni 15 September, 2024 – 1 Ottobre, 2024
Sulla raccolta fondi
ricerca dei libri
libri
Donazioni:
71.6% compiuto
Entrare
Entrare
gli utenti autorizzati hanno accesso a:
raccomandazioni personali
Telegram bot
cronologia dei download
inviare a email o Kindle
gestione delle raccolte
salvare nei preferiti
Personale
Richieste di libro
Studia
Z-Recommend
Elenco libri
Più popolari
Categorie
Partecipazione
Donare
Caricamenti
Litera Library
Dona i libri cartacei
Aggiungi i libri cartacei
Search paper books
Mio LITERA Point
Ricerca termini
Main
Ricerca termini
search
1
Electromagnetic Nondestructive Evaluation (X) (Studies in Applied Electromagnetics and Mechanics)
IOS Press
S. Takahashi
䎓
magnetic
crack
figure
current
eddy
signal
method
signals
frequency
steel
electromagnetic
䎃
probe
measured
depth
experimental
numerical
surface
shown
measurement
testing
coils
stress
䎑
sample
obtained
minor
nondestructive
sensor
impedance
䏈
conductivity
density
㪇
japan
materials
measurements
noise
analysis
creep
shows
䏌
barkhausen
defects
cracks
parameters
samples
features
excitation
Anno:
2007
Lingua:
english
File:
PDF, 7.73 MB
I tuoi tag:
0
/
0
english, 2007
2
Innovation in High Speed Marine Vessels : 28-29 January 2009
RINA
Royal Institution of Naval Architects
speed
vessels
vessel
䎓
figure
hull
ship
marine
wave
䎩
fuel
䎰
䎑
australia
䎶
innovation
䏑
hindrance
motion
naval
slam
waves
fremantle
patent
weight
䏌
ships
䎖
conference
royal
architects
structural
institution
slamming
strain
craft
䎵
frequency
composite
trials
loads
tests
engines
䎗
analysis
aluminium
materials
㪼
䏋
㫀
Anno:
2009
Lingua:
english
File:
PDF, 28.57 MB
I tuoi tag:
0
/
0
english, 2009
3
Constructive Side-Channel Analysis and Secure Design: 4th International Workshop, COSADE 2013, Paris, France, March 6-8, 2013, Revised Selected Papers
Springer-Verlag Berlin Heidelberg
Juliane Krämer
,
Dmitry Nedospasov (auth.)
,
Emmanuel Prouff (eds.)
key
fault
analysis
attacks
algorithm
leakage
cache
springer
correlation
heidelberg
byte
lncs
implementation
first
traces
䎃
bits
values
䎓
consumption
different
collision
attacker
exponentiation
䎑
function
cpa
random
pairing
output
encryption
countermeasure
differential
injection
correct
equations
faults
bytes
2nd
implementations
exponent
hamming
probability
䏈
clock
coordinates
equation
input
recover
chosen
Anno:
2013
Lingua:
english
File:
PDF, 5.89 MB
I tuoi tag:
0
/
0
english, 2013
4
Свет и цвет
Влад Мержевич
㞏
㽸
䏕
縸
ѓ
ॿ
ᦺ
ᾢ
ῄ
ῥ
☿
⺩
⾍
⿎
⿓
㗜
㟽
㤿
㪓
㹲
㺵
㻞
㼫
㼼
㽲
㾅
㿂
㿈
㿐
㿦
㿫
䁿
䉏
䌟
䍟
䏯
䏿
䔟
䕥
䗾
䘼
䙉
䟵
䤫
䯷
俢
匷
咋
噥
埥
Lingua:
russian
File:
CHM, 414 KB
I tuoi tag:
0
/
0
russian
1
Segui
questo link
o cerca il bot "@BotFather" in Telegram
2
Invia il comando /newbot
3
Inserisci un nome del tuo bot
4
Inserisci un nome utente del bot
5
Copia l'ultimo messaggio da BotFather e incollalo qui
×
×