{"id":9214,"date":"2022-03-31T20:16:36","date_gmt":"2022-03-31T20:16:36","guid":{"rendered":"https:\/\/10.12.1.49?page_id=9214"},"modified":"2025-09-12T11:20:26","modified_gmt":"2025-09-12T09:20:26","slug":"computer-engineering-informatics-and-communications","status":"publish","type":"page","link":"https:\/\/library.uz.ac.zw\/index.php\/computer-engineering-informatics-and-communications\/","title":{"rendered":"Computer Engineering, Informatics and Communications"},"content":{"rendered":"<p>[vc_row][vc_column][vc_tta_tabs][vc_tta_section title=&#8221;Faculty Home&#8221; tab_id=&#8221;1648807185121-b8c6e6cd-b0eb&#8221;][vc_column_text]<\/p>\n<p><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignnone  wp-image-11604\" src=\"http:\/\/10.12.1.49\/wp-content\/uploads\/2025\/09\/IMG_4862.jpg\" alt=\"\" width=\"122\" height=\"183\" \/> <\/strong><\/p>\n<p><b>Ms. Precious Mwatsiya<\/b><\/p>\n<p>Subject Information Specialist \u2013 Faculty of Computer Engineering, informatics and Communications<\/p>\n<p>pmwatsiya@uzlib.uz.ac.zw<\/p>\n<p>Introduction<\/p>\n<p>&nbsp;<\/p>\n<p>Welcome to the University of Zimbabwe Library Faculty of Computer Engineering, informatics and Communications Liaison Section. The Liaison page has been designed to assist students in the computer engineering sector as well as the academics with academic activities associated with teaching, learning, research, community service, innovation and industralisation. The Subject Information Specialist for the Faculty play a key role in liaison between the Faculty, students and the library. Our fundamental task is to synchronize communication between the faculty with the library to ensure seamless support for faculty endeavours related to the universities mission and goals. Listed are e-books, e-journals, open access resources, training services, theses, and referencing and citation. You are welcome to navigate these via the tabs above<\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;E-Books Available&#8221; tab_id=&#8221;1648807185123-0b487f7a-6cdc&#8221;][vc_column_text]<\/p>\n<table border=\"1\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td valign=\"top\" width=\"252\"><strong>Discipline<\/strong><\/td>\n<td valign=\"top\" width=\"255\"><strong>eBook Database<\/strong><\/td>\n<td valign=\"top\" width=\"567\"><strong>eBook title<\/strong><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"252\"><strong>Analytics and Informatics<\/strong><\/td>\n<td valign=\"top\" width=\"255\">Wiley<\/td>\n<td valign=\"top\" width=\"567\">Information systems security officer&#8217;s<\/p>\n<p><a href=\"https:\/\/onlinelibrary.wiley.com\/doi\/book\/10.1002\/9781119618393\">https:\/\/onlinelibrary.wiley.com\/doi\/book\/10.1002\/9781119618393<\/a><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"252\"><\/td>\n<td valign=\"top\" width=\"255\">ARDI<\/td>\n<td valign=\"top\" width=\"567\">Informatics for Materials Science and Engineering: Data-Driven Discovery for Accelerated Experimentation and Application<\/p>\n<p><a href=\"https:\/\/login.research4life.org\/tacsgr0hinarizw_summon_serialssolutions_com\/2.0.0\/link\/0\/eLvHCXMwtV3Nb9MwFLdgO0A1CRigdRtgceAyBRI7aeppcGAMKnFCG1-nyLEd0bXNpCYbaH_G_uK958SJ2xMcuESpE9lVftb78nu_Rwhnr8NgTSYwM055nAswF_KEJTwF5It4ZJTVKLZpxJfv8eQD-3zKf_ScCP3YfwUexgB6LKT9B_C7SWEA7mELwBU2AVzX7OPup8tNb81RZRkXDuC2We_AVfJgyNz0dIQYG8B80UAvUQLi0Y3C_M4mo1MqBQoKeSW03xWgdtnM3kF4f3R03kRXUZD8arp0uwBD5KXzNVE02zDbJiwGEwP_aSHLcsULRbNMoF-zxml94Zom2OdgB4SvkM98oaeqfmvK4OvpXbIJJkKKkmny6WcXGwO3apwK60S7qR1ZUrfUgAxkNQNFAEqirlb8g3vVbDqfV6DGGt4vayqcPSSbButHHpE7ptwmD1zXDNoK0W0y8CggH5Obo4Vczt55aB29sSMUBmgHGm1ea6Fzr8CHpx6Ch9TDj3b42Zk8_OgafnYaD78n5NvHk7PjSdD2yQgkOKMRaDQ0oyMhRRQrKcaaFzkzoTZgjqlxwrTGXGEO8luxoki40bGQIyFlmOQC7WH-lGxJLKgoa1t4qXcIRaJIpQoJmlTGqRR5osH3l2kYqRiQZEPy0vv-2dXcHu5X2QreQ0IdLJl93mYcZyfvjyMecS74kLzo4MrsFCz-k2b5zKA7MQIHevdvVtoj9_u9u0826uWleYac36VcTq9_P7cb7BaWk3ML\">https:\/\/Informatics for materials science and engineering<\/a><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"252\"><\/td>\n<td valign=\"top\" width=\"255\">ARDI<\/td>\n<td valign=\"top\" width=\"567\">Data analytics for intelligent transportation systems<\/p>\n<p><a href=\"https:\/\/login.research4life.org\/tacsgr0hinarizw_summon_serialssolutions_com\/2.0.0\/link\/0\/eLvHCXMwtV07T8MwELaADlAx8BRvRQxshcR2m0QCJPqAShUD4j1Vl9hWUaGgJlDBr-fsuknDBAOLk9iSI92d7ux7fEcIo4du5YdOoDLwGY9CPC5EVVplPnJe8ZqMjUUxTSOu7nm7STvX7CHvYZrP_SvjcQ5Zrwtp_8D8bFOcwHcUARxRCHD8cT7OPsf8b0Kqy63g-dMAMSuTdz6B30x1a4gxqPlYAJIp4HIT7H8diZ4NsV9C0hu-Z0m8Z2-2DXVeC9Ec-7070LeyZt0IaJp09kk1921ZQ1y4XmrjpTGmLCRsEZc6W8czW-1AA5W_iKc4PZGDyu31LCmh7fe1ymlfPOZOr5DSwPR6zLYOLQpS9qsyKUPSRw2P2j9NiiYysGbtZomUpC4GWSYzcrBC5idV3MkKKU8BOa6S-vELDPunmubHR-bVyUjvIOmdKdI7RdI7lvRr5O68ddNoV2x3igp4ul8zPgBcXosVd5n0JHWVojUaKxoIGkd4rxVURkoEcSQUqlIZ-XHoCRaxKuM-iJCtk0XQZQyD1JQ7ig3icAFeEDDh-qB4yCEEV7qgQ8GhF3ss2iT7U8TpfjybkHrSLTBjkzgTmnXNus3z7bbqDW5O3O7Wb_bZJgu5pOyQuXT4Lnc1jvYAhk9foz3D22-sQDVg\">https:\/\/data analytics for intelligent transport systems<\/a><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"252\"><\/td>\n<td valign=\"top\" width=\"255\">ARDI<\/td>\n<td valign=\"top\" width=\"567\">Perspectives on data science for software engineering<\/p>\n<p><a href=\"https:\/\/login.research4life.org\/tacsgr0hinarizw_summon_serialssolutions_com\/2.0.0\/link\/0\/eLvHCXMwtV1Lb9QwEB4BPcAKqRSo2L4U9cAtsImdOJZKD32uxAGhLc9LZDuOFC0bpE2gqL-eseM8GiFVHHqJsmPZyc43Ho8nnhkAEr6Z-SOdEOqEESo5mgsyCiPCEPmcxlrZFcUWjfj4hc7PwvcL8rVPutjT7hV4pCH0JpD2P8DvBkUC3qMI4BWFAK8j-7j7WbsaHF0Upf0icCZq0c1kc7ZwgQr42pz7GqQk7Nivy5uiUSAI5r98MyaeuuiE4nth_N8rV3B5cOjI-ROCsT-hC3Rp38hI4MjN324_zeKGk37WFFsZ5a0-PzmlEQ9jQl6bLOarrFD1O136nxYPYQMNA2b00fzyW-8RY4wRxmzeIzeuS8rVP2cCE1EtUf3j0lBXt3cFlcjFupjA42qJ7KiQiU3aL2spXD2DDW3CR7bggS6fw2ZbNMNz__MFfBgC4_0svaOVWC-PDTxHb-2to7geLREh81rIvAFkL-HzxfnV6dx3VS18QXhAmS_iIFc5zgg500kWZrmiKosjJEomiVIBmggs4Jky2eaEkCwKpWQ8QY6JiGlJtuGpMOEPZW3DJLNX4KkMOxCOgq85zSOdqIQLHkSMJkpnKp7C4YBv6e8f9lN8lfbMjYNkCl7LztS2u_PBaQ_lFPYaNqdN_2A8ws6t5vHwHTJNe0j_sFQuq2ZjklC6c_cb7MKTXmr34FG9_qX3TXLvEh97c31gZeovaDpjnw\">https:\/\/perspectives on data science for software engineering<\/a><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"252\"><\/td>\n<td valign=\"top\" width=\"255\">ARDI<\/td>\n<td valign=\"top\" width=\"567\">Applied cyber security and the smart grid : implementing security controls into the modern power infrastructure<\/p>\n<p><a href=\"https:\/\/login.research4life.org\/tacsgr0hinarizw_summon_serialssolutions_com\/2.0.0\/link\/0\/eLvHCXMwtV3JTsMwELVYDlBxYBVljbiigBNnlYADZanECcp6iuzEkUoXoSasX8-M6yz0gjhwiRJXcqo31szzxPOGEGYfUHPCJ9gy8JkjQqALwrVd5oPlU8eTsYooqmnE9YPTPrOvOuyx6p5Yjf2r4WEMTI-FtH8wfjkpDMA9LAG4wiKA6wQ_Lh_16WNNL1ufQo50Wj3_LA9MdgawZvYvR8WBdmyAzV9eCtdYOwjMB-O2T_s3_LmeI8B-DT9yBGXxSuEvcFVVqXtVVlGkBscbSwv3GcAdx-19JhSpz09b4CFdCyIl6pMPkm6cH8uhedeZJrMQ8n30NO3LpzLXBTSPBijDOF_O62m5rfI9DdLgWQ8cOzj9PPvB9-eyXrffzyAs1UL_7SKZlfjHl8iUHC6TRk2_cYW0NMjGEaDZO1FQHx2qez1U4F6MAvwGwG8o-A2Ef5XcX5zfttqm7kphcg_F4k2WBjL1qWAiDSG4C4oS-7GFJcbUS2gQW550UivkiRPbwoYNbgIsl6Us8EMvljFbIwscyxeGuSpzTNaJYQFoHKi4gN2pIz1XBMCLw9hJgYIJl9Im2auhE7311af0LEL9KGBoKPsW2E1iFKBF6nd9vjeqDNYkuyWYkZrCdj78SPQyqtXbNn6fZJPMV4tsi8zko1e5jfraQz7qfr3vKON_AxxAN6I\">https:\/\/Applied cyber security and the smart grid<\/a><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"252\"><\/td>\n<td valign=\"top\" width=\"255\">ARD<\/td>\n<td valign=\"top\" width=\"567\">Designing and Building Security Operations Centre<\/p>\n<p><a href=\"https:\/\/login.research4life.org\/tacsgr0hinarizw_summon_serialssolutions_com\/2.0.0\/link\/0\/eLvHCXMwtV1LT-MwEB6xIMFWSCyPFeW1EQduBdd27EQCDjyWSistQrxPUZLaUmmpUFN2V_vrGTt2QntZcdhLVNtq08w38YznCcDoPmlN7QlURZLxLEZ1IQtpyCQir7lQuZUotmnE1T3vnNEf1-yhbppVz_1X4HEOoTeJtB8Av_pRnMDPyAJ4RSbA65R-XA1L_M9saIZPQTxx3a-dfR0178sXNXJhcMbCWwfp_rTW9GIy4N3ZBdp8yi5QJaz4PcJwUm2ut6kU3hxYHiaNqCLGCyhr2VBF7J2fnOLLz0UY75ma5M_dXj4-UsPW7fUnmEMxL83u0rl49O-y8QCLyHlon8oyPni0im1VI38fVwCpGjegkRZ93Nxx4x8Xkzp_kep01GvAQtHvDQYFyigUmcLpATdfYE6ZJ1qGGTVcgXmfNbACS747RuAIsQrHFQIBIhB4BILD53TUP_Y4HB7YYVDDEZRwrMHd9_Ob007LdatopSg0jD9dImdT0zVDEaEYw6dlVGrNuiyNhCRKoHKcR5oJkYeKh5rkXaJzGmpNicgE-wqLqUlrGI5t-mN3HYI2EjZFFT3DUytXIswi1JfjnGtUzbKQkCbsvqNY8mtgXexF4snaxhNq3ITAEzKx6y7uN6lBbcJWSeCk_H47mQCmCRsTy1OL3ypMynXK_8gk65sSZVIyITf-_Qc24XPNxFswOx69qm1Ts3uId_37e8cy1xtIfVAo\">https:\/\/Designing and building Security operations centre<\/a><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"252\"><\/td>\n<td valign=\"top\" width=\"255\">ARDI<\/td>\n<td valign=\"top\" width=\"567\">Implementing analytics : a blueprint for design, development, and adoption<\/p>\n<p><a href=\"https:\/\/login.research4life.org\/tacsgr0hinarizw_summon_serialssolutions_com\/2.0.0\/link\/0\/eLvHCXMwtV1LT8MwDI54HAAh8RbjWYHEBQ3WJmlWCTgwBpPQDmjjdarSNhVTtyK15fnrcbKsa3dBHLhUddJGqp3YX9zYRghbJ7XqhE6wRJ1h4jkAFzxqUcxA8iGxha8siioacfdIWlfWbQc_jV1m47Z_FTy0gehlIO0fhJ8PCg1wD1MArjAJ4DqBj3NSn00f6JPhwyhE3v_KCgfbOy-iF70M1aty47fBZL2-JkUngCzIUHICtFUJqONb_hbCK3FpjwgWiMiUK8OSDBPJpb0o1aiNHslc44Og52fnIq7ed6bRLJhvJrVG6-Y591vVQJA1TFV2IjUwIIQxAfshndVo1GmWaEca8QWeRqDBQbtnaQnYz6VRr99Pwf6AObS1je8uo1khAz9W0JSIV9GShueGVn7pKloo5G4Eqp0nvE3X0GGR3cbZgCfRRc70s1NFr6OH62a30arq-hNVbhPYOcsQexZQwThhgtpO6BFZmT0MhGl6QggAALACLJ_UPd-xmU25x4ltEWpiP4QvtfAGWuQyUCHOVEBjsIkMwgNc90DrMRv0J-MO9oUT0JA4pk9gLVTQQYE97ntf_TRP3RJPK8gYcc1V_fokr9u8bJiA2QEmV9B-zk1XDWGRT-YWBL716xPbaH482XbQTJa8iV2ZSDvmSe_7Y0_NjB85jyv7\">https:\/\/Implementing analytics<\/a><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"252\"><\/td>\n<td valign=\"top\" width=\"255\">DOAB<\/td>\n<td valign=\"top\" width=\"567\">Computer Vision Metrics: Survey, Taxonomy, and Analysis<\/p>\n<p><a href=\"https:\/\/login.research4life.org\/tacsgr0hinarizw_summon_serialssolutions_com\/2.0.0\/link\/0\/eLvHCXMwpV1Lb9QwEB4BPUCFVKAgUgrkB3Rh14_YrgoH-tBKiANqtfRm2bGtrnbJoqSFll_P2ElotuLGJdJoEsX22DPf2J4ZAErejUd3dALxUlBmFcIFywmnAiUfWOHLZFFS0Yiv39j0iHw-peeDyl_xlqVbmQg4m3SuH4lW5XebPag965sP9dztoyHm4j5sxCRi0Q2bTaaD3Ra0jIKlyC6KZh5Bgbol8NFnf7plDmgai9tt2rldzld2hZKL1ZHMD1-tw9LGBPRvN-Fhs5gvlw2q0TbvVNK8J1v_0asnsOFj7MNTuOerZ7DVIdS8W__NNhwdfDf14mNfCuLgfSLzWQpQz7_E6lxls5-fXtU__c1efmauU8zEXm4ql_f5T57D7OT47HA66uowjAxHvMVGTvAQA0koL4JyijHulKTME2XQvUIXMiBQUWNLhCWGBFQb0tPCiVIF45Vw9AU8NvHCfnWZAvvcS8iR57nzFN0ZyoKYGGYU9tVRI1zpXcjgfDDgOtYS69IfXXT7Wzpmxh6-g0tUMzmWopRSK8RemgVrtSyC1RSbx4UpKM7CDLaT9HQvA50GOYO8F6ZOJ9Xd9Vh9_OmQxjgvyTPYbYWs2-8mem3SZLCzxr7DfPt3XrR8wq6Ftosm4UAh5M6_2_UKHiFKY-2-zy48uKyv_OuYzrrCP_3-9SbN9D-XBAAz\">https:\/\/Computer vision metrics<\/a><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"252\"><\/td>\n<td valign=\"top\" width=\"255\">ARDI<\/td>\n<td valign=\"top\" width=\"567\">Data Insights: New Ways to Visualize and Make Sense of Data<\/p>\n<p><a href=\"https:\/\/login.research4life.org\/tacsgr0hinarizw_summon_serialssolutions_com\/2.0.0\/link\/0\/eLvHCXMwtV1LT4NAEB6rPWjTRK0a65N48GIwwG7ZcvBiW23SeDCtrxNZYElIWw6FqvHXO7sCpb0YDx7YwAJLmFm-mVnmAUCsa0NfwQRLtBmhnoPqgteyWoQh50NqC19JFFU04vGF9rvWYEheK2v5ItOi718Zj33IehlI-wfmF4NiB-7jFMAWJwG2K_pxcfjD_y5PufQ0l8Z3soDeKM3cu_rzOPfMzYx-WYBhyeh_UCWfrgZ8Hk55HC_ZhFJJajP87KwFxBeOd944UVobfqqXMrf4NIj89EbE-tNwHaoorplEif79W7FOZTCbodmhshFlA7ezxEXFg2pQ48kYQRkBO02WdPXNZBxNJgmKFJRwTiaFRjtQFTKWYxcqIm7Adl7BQssArQG1UjrGPahLmmk5zfbh-a436vT1rFyEzikhjq37vscZRw2Gt3FKofz1qI0bt1sIY7YhfJPYBqGhiTjmhEwQ37StAI1QEoaGE3jkAOpcxhXEqYo_DA5B851QtAJB0OrCO5nJKXdQ4wsIZ4EvgrAJF6VXd98n6h934pboQ50maDlFXHU-c7x1e7cdmdAQSdqE84JSrhrCop_MLfHr6NcrjmFrMVdOYCOdzcWpzHsd81n09XGmGPsNGUAUgA\">https:\/\/Data insights<\/a><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"252\"><\/td>\n<td valign=\"top\" width=\"255\">ARDI<\/td>\n<td valign=\"top\" width=\"567\">Big data application in power systems<\/p>\n<p><a href=\"https:\/\/login.research4life.org\/tacsgr0hinarizw_summon_serialssolutions_com\/2.0.0\/link\/0\/eLvHCXMwtV1LT8MwDI54XJg48BTjpQoJLlNR16SvAxfGYBIntPG8VGmabRXQSVsLaL8eO2RttxMcuERtoqaq7dpOHH8mhNrnlrmgE2zpe5RFAbgLkWM71APO95krhbIoqmjE3SPrXNm3XfpU1jAp-_6V8dAHrMdE2j8wv5gUOuAaRABaEAJoF_zj4lZHaJNBA49_NiohanVkHMuiaQDnwp9-GY5ypYzzrzwtZWCA2-py-MOGKa_uEIDVwdMWXrltpW3s3MpRRdDg71vEoR7NCh3o8YCeIQb5e5yI7EKm5n13mayCWfdQm3Runov9LKyPC96aQi3SU1MNcFS8qkZqfPIKyhsUezaZt362tmy9DbIqMc9jkyzJdIvUKriM2-QUiGcg8YwK8YwkNRTxDE28HfJw3e61OqauJ2FyTK91TFDuCNAXiDiyPBH3MXu0HwgeCHCjmIPusaRe0PR9n8O6y7EiS4CYMifirrSanO6SdY6JB2mmEhTjPWJQCc95gjKLgTNmu1wyIXzBBPhBTDR5nZxUvjn8eFNB8Ek4R-M6MWakCNW4Ppkbti9bTtNFxKL938xzQNZKATgkK9k4l0eIfJ3ycTL9PFYs-wbwTRYH\">https:\/\/Big data application in power systems<\/a><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"252\"><strong>Computer Engineering<\/strong><\/td>\n<td valign=\"top\" width=\"255\">ARDI<\/td>\n<td valign=\"top\" width=\"567\">e-design:\u00a0computer-aided\u00a0engineering\u00a0design<\/p>\n<p><a href=\"https:\/\/login.research4life.org\/tacsgr0qw4hd2ks3x_search_serialssolutions_com\/log?L=QW4HD2KS3X&amp;D=HGY&amp;J=TC0\">e-design:computer-aided design<\/a><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"252\"><\/td>\n<td valign=\"top\" width=\"255\">ARDI<\/td>\n<td valign=\"top\" width=\"567\"><a href=\"https:\/\/login.research4life.org\/tacsgr0hinarizw_summon_serialssolutions_com\/2.0.0\/link\/0\/eLvHCXMwtV07T8MwELaALiAGnuKtLLAFajuxk4EBSiESC6itgKly_JA6kKFKhcSv5-w4SZsFMbBYjhU5yt3l7nzx9xkhSq77Yccn5DwVmFPFlIAEAdNI8NREhmvOheLCgpNf36LsgTyP6Ht7zEE79q-KhzFQvQXS_kH5zaQwAH0wAWjBCKDt5MfNZaX_l4rKFRyK3aLhzjxzyPNqjwAowDLj3i3jEPxXv4BOmC3Ecj0AR516QANUqX2DtaBOmb5ePtp8KoWUy1cYV3mnh_cDzAjkf_TKspB_qpksb3URTkbrqAeBnVt_kj19tBUtbLMX7niL_LzcUxw1z1mNeIkP4-Md1NMW27GL1nSxh7aWuBj30aUXWFAJLKgFFjiBBSCwGxDXAZo8DseDLPRnSISCkSgOc8WTmChYtfG-lgIbS4XKNU5MGvchgFMdGSUIU5qamGjF3KIM7JolEtKjnB6ibWGxBkXpMInqCAXSUCkkERCzLL-dEnmsHDOcZFjLBB-joH7Jqfvl7ffZTluRnvx-yynabNV7hjbK-UKfWxbrQsxn318XTvg_kxEGFQ\">Product Design Modeling Using CAD\/CAE: The Computer Aided Engineering Design Series<\/a><\/p>\n<p><a href=\"https:\/\/login.research4life.org\/tacsgr0hinarizw_summon_serialssolutions_com\/2.0.0\/link\/0\/eLvHCXMwtV07T8MwELaALiAGnuKtLLAFajuxk4EBSiESC6itgKly_JA6kKFKhcSv5-w4SZsFMbBYjhU5yt3l7nzx9xkhSq77Yccn5DwVmFPFlIAEAdNI8NREhmvOheLCgpNf36LsgTyP6Ht7zEE79q-KhzFQvQXS_kH5zaQwAH0wAWjBCKDt5MfNZaX_l4rKFRyK3aLhzjxzyPNqjwAowDLj3i3jEPxXv4BOmC3Ecj0AR516QANUqX2DtaBOmb5ePtp8KoWUy1cYV3mnh_cDzAjkf_TKspB_qpksb3URTkbrqAeBnVt_kj19tBUtbLMX7niL_LzcUxw1z1mNeIkP4-Md1NMW27GL1nSxh7aWuBj30aUXWFAJLKgFFjiBBSCwGxDXAZo8DseDLPRnSISCkSgOc8WTmChYtfG-lgIbS4XKNU5MGvchgFMdGSUIU5qamGjF3KIM7JolEtKjnB6ibWGxBkXpMInqCAXSUCkkERCzLL-dEnmsHDOcZFjLBB-joH7Jqfvl7ffZTluRnvx-yynabNV7hjbK-UKfWxbrQsxn318XTvg_kxEGFQ\">https:\/\/The Computer Aided Engineering Design Series<\/a><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"252\"><\/td>\n<td valign=\"top\" width=\"255\">ARDI<\/td>\n<td valign=\"top\" width=\"567\">Modeling and Analysis of Real-Time and Embedded Systems with UML and MARTE<\/p>\n<p><a href=\"https:\/\/login.research4life.org\/tacsgr0hinarizw_summon_serialssolutions_com\/2.0.0\/link\/0\/eLvHCXMwtV3PT8IwFG5ULhoP_owgmt7JDFvXdTt4UoSIHgwQ9US6tU1IZCQIMfGv973uF-Ng4sHLAn3ZDl-7vq9dv-8RwrybrrM1J8Qikq5gKlASCILLfCki4xuhhZBKSBQnv7z6g3tvOGJvVVnXqu1fOx7aoOtRSPuHzi8fCg3wG4YAXGEQwHWLH5d_8_JMWOKmUCDWrUfkh4PKDxvpzWMNc48qrMuzjdnJ81N2AgPpbrkJoyHloQtrp4-qZbXxOR7nnI9ZsrmF4NrDaJnCMTtGZAtIdYZybeYyTWsrTMhfQNlglbXlV70oCiJUcfQqn6tZsrrVqTMZ7ZIGpH-Bs86g_17te0HKDLzQuhvlt0a5EVL5KLRtlUYuc127zVzjI9LQqP84Jjs6PSEHG36Np-SxAJUCOLQAlS4MLUG1kQJUmoNKEVQKoNqoBfWMTB5647uBkxejcFKgoKGTeHHM4LXzwgQYL9Bc30jI7IE0Xa4483UcGhaxQHGXuTGsWzgzTCseyagrQ5Gwc3IoUbSQrqy4UV0QGoeBAbrlatToAHGTEYe3xCjuGd5NjGiSdobDFIfQ59Sd1mBqklYtXAu2fgtekv1qHLTJ3mq51lfokJ3CDd9f17bLfgActSGv\">Modeling and Analysis of Real-Time and Embedded Systems with UML and MARTE<\/a><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"252\"><\/td>\n<td valign=\"top\" width=\"255\">ARDI<\/td>\n<td valign=\"top\" width=\"567\">Software\u00a0Engineering\u00a0for Embedded Systems: Methods, Practical Techniques, and Applications<\/p>\n<p><a href=\"https:\/\/login.research4life.org\/tacsgr0hinarizw_summon_serialssolutions_com\/2.0.0\/link\/0\/eLvHCXMwtV1Lj9MwEB4Be4AKCVhAlKfFeQNN7GQStHBgWajECe3yOkV27IiqbQ5NYBG_nrFjJ9mVkODAJWrsyI38WfPKzDcAPHm2iC7IBIWFjJHrTEsyEGIuJBa1qNEgSo3SFid_-CyWb5L3J_zL2LJuHPuvwNMYQW8Laf8B_GFRGqDfdAToSoeArhfs4-E21N3W3ZlN6zIj42DP771VhqSN9iTOLiWu7yPtIPVlUzYHPdC7tiHFc_q1e4jOtt9kX1fWJ2lPwwi2pYOYhhFIpDYmhAd755JUF2l3cufEqCuGDL5xXpDIszTlW72qupemiT6eXIY90vxoBc7y3dch5LUoFra1uSM28ktnngNp-KsZzGS7JvlOsr9rz5n9V9v1arNpafcmFsDpTdgztizkFlwyzT7cCM0wmJeN-zCbMDvehu5wK3frVwGEw-fulvWjE0TCBAHDAjDMA_OCeVgO2AAKG0E5YAQJm0JyBz69PT49Wka-wUUks0JgGsmc7E0h48SQGZ0X5O0g1iJXdUU-Dy9UblKeWsbBPC0kqrzWOk-0EkhqoUprze_CdWkrIZrOVUzqe8AM1zzLdJxKnoqsQqUWidGVqA1WCSozh6eTHS5_bNxX-bY8h-gcWNj40s37VOHy-PVRTB42vdYcngyAlG6JRPzEUq2NK_Amx-OPT7Thift_8y4P4Np4YB_ClW733TyydN6N3K1-nT12h-w38H9jNQ\">Software\u00a0Engineering\u00a0for Embedded Systems: Methods, Practical Techniques, and Applications<\/a><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"252\"><\/td>\n<td valign=\"top\" width=\"255\">ARDI<\/td>\n<td valign=\"top\" width=\"567\">Visual Usability: Principles and Practices for Designing Digital Applications<\/p>\n<p><a href=\"https:\/\/login.research4life.org\/tacsgr0hinarizw_summon_serialssolutions_com\/2.0.0\/link\/0\/eLvHCXMwtV07T8MwELaADiAhlacoz0wsKCiJnbgeWCiPSoUBtRSYIid2RNQ2Q5MKxK_n7Dgp7YIYGGLlLlZi-6y7yyX3HULYu3TsJZ0QUcZdikUgODgILiacsoQkVFLKBeUqOfnphXRvvF4fv84rzs15_yp44IHoVSLtH4Rf3xQYcA5bAFrYBNAu-cc1Wcp_mOYqM2RWQugWdeS8H7-PNaamlhTP0lovP4CNrFLBjBoykU4TFVAVGhaiAo-6JtRFj8-SCc-yhZdGMElEoeSUIEJLaNPRKC_dOMc7V-DjE5HGxZXM7Of-KmqAPadKjXTv3-pAFvhspM0cDVekwAR9HAQlUT6FGJij6qJb02YUC779ej5Kx-McTBBYxMCY-cEWakiV-7GNVmS2g5pVxQvLKMBd1CxX1apXdQ8N724Hna5takrYPHAYdWzBlZYDr1JoLLwgohyGz3yuDpkQSqSUbRawWJW-AZYvYEJceEQyJhOM99EmV8kHWaGTFMUBsiRWfYTrc-yTIKZR5HhSxCSRNPZoJFvIqmYY6m_g5sfb8Pa6Ax55G1O_hc7qmYeqS-6RTxr-EMfhrz2O0MZ8KxyjtWI6kycK9zrj0_Tr41TL7RuNDBLU\">Visual Usability: Principles and Practices for Designing Digital Applications<\/a><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"252\"><\/td>\n<td valign=\"top\" width=\"255\">ARDI<\/td>\n<td valign=\"top\" width=\"567\">Fundamental Approaches to\u00a0Software\u00a0Engineering: 21st International Conference, FASE 2018, Held as Part of the European Joint Conferences on Theory and Practice of\u00a0Software&#8230;<\/p>\n<p><a href=\"https:\/\/login.research4life.org\/tacsgr0hinarizw_summon_serialssolutions_com\/2.0.0\/link\/0\/eLvHCXMwpV1RT9swEDYTfZk0iY1uGmxM9wNSSGLXbhBDqliranvpVAS8oUvsSBGQoCQT2n797hIXysTbHs-JFUe2P5_P_r4TQsaH4egfTEhNgpGRVlskByGSCk2Sq9w4Y9AaZHLyz0u1-Bb_WMmrjcxffMvSVsgOZ9Od67PRQ74P9hB61r-_1oU95hNFAuMBi4jxNuwiWjxFW8gPMipkcofkW0IE28mGIU2vxfP4UD23OQXdoMJ7x1zviV985jv_0c63YuCYzfBOvHLlrthZ53AAP6WHW8M5U0F6hX-YeoFx10Bbwckd1jenK8LpB6zdyVFn-tINGUP_4BjiqGnhWYQRnviEAcynqxmQIzAJgNY6C9jAksYtVDmQEwrrYwH4XhVlu1GzgaqEXkIAsLSw9LwurvhiEwOYnU-XK_8tqtk0eEvQdVMEwNeMuDHT-7q4hUjR9A38i8vHpbx5Ly7ms_OzxchnihihZBQaOasmNskMxk6nVqGMJzpRqAhfQvK4aNOmXMQbcirP8lQ61LlOlQqzcabDLJEfxBtkSkHZdtRD-1GAk1ZqbaMxyrHSmUnTMHY2U7kzWWxStyeG3ZC4Xnf8ddez-y8XfxKv-W_66M1nsd3Wv9wBi1KXWBd_Hr504_UvvUDw4g\">https:\/\/Fundamental approaches to software engineering<\/a><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"252\"><\/td>\n<td valign=\"top\" width=\"255\">ARDI<\/td>\n<td valign=\"top\" width=\"567\">The Essence of\u00a0Software\u00a0Engineering<\/p>\n<p><a href=\"https:\/\/login.research4life.org\/tacsgr0hinarizw_summon_serialssolutions_com\/2.0.0\/link\/0\/eLvHCXMwpV3LThsxFLUq2BQhUQiItIDmB9KOH2PPIMqiNChSV4hCs7P8FBE0iSYgBF_PvTNONEHddXntkUd-HV9f2-cQwtnXfPAOE6yqDFXcS2_AQaBcGFVFEVVQynhl8HHy1R8x-sl-XfNxR_kLb1n6mUGHc9Gc66PRQn4K9gB61i_f64k_hYWYw-Z9E0nEcBt2S0eraAtD0hOJGk8cxpyCVVqWHUPJlotnlcnXbZQy3rIT-zCZ2Rn0HKojmXmYrgE4gHdali53_qMGn8hmwHcOu-RDmO6RnaW6Q5Yme68RoM-GiwVa2SxmZ39NfX9-DbD9bOpw9q0xU2qH1TBl7JOby-Hvi9EgiS0MDGeVEAMkkhOFZUZCdQUtY8nAleIGZjiFPaB13AbhuGB55FUsy0CVAYiSMo-ikpEfkG2Dl_Knj83jPX9IssA9l9LTwvBCSKeszVnwTsSgHFM29Mm406ga9cISxdFdimFpZL_ufgPTUEv4qSoC07YsCw2lUV256HSEMVVIFZ3PXZ_0mh7Sy7bXTeP2yX6bPG-5PJCyGTCb9km27EjdnFKnq7F6-OOiAA-HSvX53yV-IR_BhyrbqMwR2Xisn8Ixkk1PTT15fT5pxuEbCfHjxQ\">https:\/\/The essence of software engineering<\/a><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"252\"><\/td>\n<td valign=\"top\" width=\"255\">ARDI<\/td>\n<td valign=\"top\" width=\"567\">Computer\u00a0Vision Metrics: Survey, Taxonomy, and Analysis<\/p>\n<p><a href=\"https:\/\/login.research4life.org\/tacsgr0hinarizw_summon_serialssolutions_com\/2.0.0\/link\/0\/eLvHCXMwpV1fb9QwDI-APcCENGAgOgb0A-ygbZImmQYP7I9OQjygTcfeIqdJtNMdPdRusPHpcdKW9SbeeKlkuVXT2HV-dmKbEFq8yyZ3bIIRCnJBbWkBAUJOGQjlmRdOCLACQnLy129selR8PqXno85f4ZSlXUEAnG3c1w9EZ_L7YA9az-bmQzO3-7gQc3GfbIQiYsENm-XTUbQFV0bBYmYXxWUeQYG6JfAyVH-6ZY5oGprbbZq5Wc5XZoWSC92R4Ier12FpCx79203ysF3Ml8sWzShadTkY85Ot__isJ2TDheSHp-Seq5-RrR6ipr0BaLfJ0cF3aBYfh14QB-8jmc5ihnr6JbTnqtr99PSq-elu9tIzuI5JE3sp1DYdCqA8J7OT47PD6aRvxDABjoCLTazgPmSSUF56ZRVj3CpJmSsUoH-FPqRHpKIyUwhTQOHRbkhHSysq5cEpYekL8hjCif36Mmb22ZckrbjzFffAUQcYOlagsspaYGXmjM8pJOR8NOM6NBPr6x9d9AEuHUpjj-_Bf1QzmUlRSakVgi_NvDFalt5oisPjAkpKmUnIdhSfHmSg4yQnJB2kqeNWdX8-Vh9_OqQh0UvyhOx2Utbdc7le05qE7Kyx7zDf_lWMjl-wa6HNoo1AUAi58-9xvSKPEKaxLvCzSx5cNlfudahnXeObfv96E1X9D_9YAeQ\">Https:\/\/Computer Vision Metrics: Survey, Taxonomy, and Analysis<\/a><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"252\"><strong>Computer Science<\/strong><\/td>\n<td valign=\"top\" width=\"255\">ARDI<\/td>\n<td valign=\"top\" width=\"567\"><a href=\"https:\/\/login.research4life.org\/tacsgr0hinarizw_summon_serialssolutions_com\/2.0.0\/link\/0\/eLvHCXMwtV3dS8MwEA_qXhQf_MTNKXsfVdu0SwtTFHUOhg-yDfVp3NpEqraDrUPwr_euTdttD4IPvoTmrgn0Lk0uyd3vGOPW2YWxMid4LrgKhEJrmyDoPGWZY1dwkCIgwCqKG356trt3Vq_PX8pUgyXtXxWPNFQ9BdL-QflFp0jAZxwCWOIgwHLFPi6qGsxfTiLKluU3bz7f6HY4dSjMkzjk_3TpjzNBW3o6K5xgstDzZmcSJ-F7efWuncLIayZePDCgu25hZFHpmdNQmi6q2YO5ivJ38_1kCujm2a0MVHYFiHqZT8jkURD6yaWMjWF_nVVwsRc0x3QfXotTLjQoyWkrxTLSTR0Ne1R0RSCtoGAaLizsgx1WkRTtscvWZLzHth4LENvZPrsuRNjQImygCBvtCKYfV7kg2-dpVVO1VDXxgA0794PbrqETThihaQvLALS-lG-7ADLgLXAdcEAIF7jCeVC16MiN9pvCD8bcBMtF240rj-NAdnCa48AP2TZQYEKcpAGMwRFrtDjuOB3pOBKNYxO4Jy3lc-VL3-USxrzK6tnXj2iYzEbmaEk4VVZbYi8xa78xj9lmqf0620imc3lCKNgxNvj-Ok0V9QMhhBkZ\">Geometric Algebra for\u00a0Computer\u00a0Science<\/a><\/p>\n<p><a href=\"https:\/\/login.research4life.org\/tacsgr0hinarizw_summon_serialssolutions_com\/2.0.0\/link\/0\/eLvHCXMwtV3dS8MwEA_qXhQf_MTNKXsfVdu0SwtTFHUOhg-yDfVp3NpEqraDrUPwr_euTdttD4IPvoTmrgn0Lk0uyd3vGOPW2YWxMid4LrgKhEJrmyDoPGWZY1dwkCIgwCqKG356trt3Vq_PX8pUgyXtXxWPNFQ9BdL-QflFp0jAZxwCWOIgwHLFPi6qGsxfTiLKluU3bz7f6HY4dSjMkzjk_3TpjzNBW3o6K5xgstDzZmcSJ-F7efWuncLIayZePDCgu25hZFHpmdNQmi6q2YO5ivJ38_1kCujm2a0MVHYFiHqZT8jkURD6yaWMjWF_nVVwsRc0x3QfXotTLjQoyWkrxTLSTR0Ne1R0RSCtoGAaLizsgx1WkRTtscvWZLzHth4LENvZPrsuRNjQImygCBvtCKYfV7kg2-dpVVO1VDXxgA0794PbrqETThihaQvLALS-lG-7ADLgLXAdcEAIF7jCeVC16MiN9pvCD8bcBMtF240rj-NAdnCa48AP2TZQYEKcpAGMwRFrtDjuOB3pOBKNYxO4Jy3lc-VL3-USxrzK6tnXj2iYzEbmaEk4VVZbYi8xa78xj9lmqf0620imc3lCKNgxNvj-Ok0V9QMhhBkZ\">https:\/\/geometric algebra for computer science \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/a><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"252\"><\/td>\n<td valign=\"top\" width=\"255\">ARDI<\/td>\n<td valign=\"top\" width=\"567\"><a href=\"https:\/\/login.research4life.org\/tacsgr0hinarizw_summon_serialssolutions_com\/2.0.0\/link\/0\/eLvHCXMwtV3fa9swEBZpB2Mw6JptdP0xRB_KRnEWSXFsQztok66BdYzRZutbkWWZuD-ckqQd7K_vnX1KnNCHjdEXYwnbWHzS6dPp7hNjSjaa3oJNiEIdpjpIgW2jBF2UShGHgdI2SFCwCvOGf_xq9bry66k6r9XcMWKzuicFHuoAekyk_Qfwpx-FCriHLgBX6ARwXeDH0yJFH5eb--MyrQ-PbnBuPzec0WVekSOcBuE5DH7arPS6ntwV2-ndGf2-3j3Uhee5myXZLL63A91tOC73coZ6uPutQelj2FQ73geOiqEH__lr5KOAeU_M-Shc8kzFzoZB4OEWajkNVevI9pJxlqpiXQWZakul6NE5oHRHXDYuhwb12EVQCNlSsPac4LY478xXTgW3ewcnFwMAGxiQgDWbvBc7KMV-k2Rmsm9zr3-6xJbCJhjWZwfH_cPvzoRJBYSgRQy6IAMqxI1gXPa7JlPqVhlluPiTQHEGhUs_Iopz9ootY9rLKqvZvM6eu3yIOltx535wAqfOVuluzD-QavnH1-zYocqznM-hyvdu9OjqM72096kocYCYVyDmDuI3rP_l6KzT8-iUDm8A3DzxpG8SFCVMTTvWsqmMiqFtGoa537ZA8FOBgxxGvFUyxuW-8RODklEibunEhuote6kxmyOfFFmfyRrjbQXLdN_6voUVBXwrsjI1KjXWhMrqWL1j24jObSnIcvE4Yut_89AGezHrsJtseTK6s1uoFZ7rUfbn93vC9wEgkHwn\">Advances in Computational\u00a0Science\u00a0and Engineering Research<\/a><\/p>\n<p><a href=\"https:\/\/login.research4life.org\/tacsgr0hinarizw_summon_serialssolutions_com\/2.0.0\/link\/0\/eLvHCXMwtV3fa9swEBZpB2Mw6JptdP0xRB_KRnEWSXFsQztok66BdYzRZutbkWWZuD-ckqQd7K_vnX1KnNCHjdEXYwnbWHzS6dPp7hNjSjaa3oJNiEIdpjpIgW2jBF2UShGHgdI2SFCwCvOGf_xq9bry66k6r9XcMWKzuicFHuoAekyk_Qfwpx-FCriHLgBX6ARwXeDH0yJFH5eb--MyrQ-PbnBuPzec0WVekSOcBuE5DH7arPS6ntwV2-ndGf2-3j3Uhee5myXZLL63A91tOC73coZ6uPutQelj2FQ73geOiqEH__lr5KOAeU_M-Shc8kzFzoZB4OEWajkNVevI9pJxlqpiXQWZakul6NE5oHRHXDYuhwb12EVQCNlSsPac4LY478xXTgW3ewcnFwMAGxiQgDWbvBc7KMV-k2Rmsm9zr3-6xJbCJhjWZwfH_cPvzoRJBYSgRQy6IAMqxI1gXPa7JlPqVhlluPiTQHEGhUs_Iopz9ootY9rLKqvZvM6eu3yIOltx535wAqfOVuluzD-QavnH1-zYocqznM-hyvdu9OjqM72096kocYCYVyDmDuI3rP_l6KzT8-iUDm8A3DzxpG8SFCVMTTvWsqmMiqFtGoa537ZA8FOBgxxGvFUyxuW-8RODklEibunEhuote6kxmyOfFFmfyRrjbQXLdN_6voUVBXwrsjI1KjXWhMrqWL1j24jObSnIcvE4Yut_89AGezHrsJtseTK6s1uoFZ7rUfbn93vC9wEgkHwn\">https:\/\/Advances in computational science and engineering<\/a><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"252\"><\/td>\n<td valign=\"top\" width=\"255\">ARDI<\/td>\n<td valign=\"top\" width=\"567\">Systems Analysis and Synthesis: Bridging Computer Science and Information Technology<\/p>\n<p><a href=\"https:\/\/10.12.1.49\/Systems%20Analysis%20and%20Synthesis:%20Bridging%20Computer%20Science%20and%20Information%20Technology\">https:\/\/Systems Analysis and Synthesis: Bridging Computer Science and Information Technology<\/a><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"252\"><\/td>\n<td valign=\"top\" width=\"255\">ARDI<\/td>\n<td valign=\"top\" width=\"567\">Current Trends in\u00a0Computer\u00a0Science\u00a0and\u00a0Mechanical Automation. Selected Papers from CSMA2016 -.<\/p>\n<p><a href=\"https:\/\/login.research4life.org\/tacsgr0hinarizw_summon_serialssolutions_com\/2.0.0\/link\/0\/eLvHCXMwpV3bSsNAEF3UvghC1Sre2R9ITXbTZFeqUKqlIAWlpfpWNnuBIqaStnh59Ev6Lf0ydzZJKeKbjzPJQjJJZs5O5swgREnd9375BM4EMyI2Fm1DCzpuSJCwmAodK2hYBbzhx6ewe0vu-_R5bfIXVFmqiQDAOXX_9UHIXX6R7LHeM_u8zsbqigD42EQVaCIG27Bh0F1lWyzwtnEzAHKHjXc26FpctBIAo-e9eFYH2boMIAHmIYk3neZVks6Xdqr_uM5dVNHAZthDGzrdR9VyhgMuPuka-i4aNOG8OBaP0-Wi-Sqyl5vy3OalE3GuLRaWSpGq5aKngT4MTxu35rNJToas474bsaMVfrC3lE0xMFlwu99rWTQQYQ8PnWPE5AANOneDdtcr5jJ4kvsfHglpyGNugRaXiqqI-DQ0dtfF_EaiGio2wsKqiDeIEYmwK2gUyIQHSkq7myRU0kO0I6B8P505mp86QjiQSkdc-yZpRKEUNGFCGj8xijIRCsWOUc2Zf1QaeeSsePK3-hRtE4i-LlNyhrZm2VyfQwPoVGTjr_cL9278ANtgwhc\">https:\/\/current trends in computer science and mechanical automation<\/a><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"252\"><\/td>\n<td valign=\"top\" width=\"255\">ARDI<\/td>\n<td valign=\"top\" width=\"567\">Software Defined Networks: A Comprehensive Approach<\/p>\n<p>https:\/\/software defined networks<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"252\"><\/td>\n<td valign=\"top\" width=\"255\">ARDI<\/td>\n<td valign=\"top\" width=\"567\"><a href=\"https:\/\/login.research4life.org\/tacsgr0hinarizw_summon_serialssolutions_com\/2.0.0\/link\/0\/eLvHCXMwtV05T8MwFLaALlRIQAFxK2KAoSpqjsbxwEJPiQlxT5Ud2xDRJlLTgsSv572cJQtiYElbN3JUf-47_b5HiG1dtlsVmcA87mlONVjbSEHHtGUKj9pcUYmEVVg3fPvkjHrWzZ39XLYhLcf-FXgYA-ixkPYP4BeTwgC8hy0AV9gEcK3Yx8XHLMw-FQqEimymfRvyA5N4rgOPvefVAmUOYiajOE3DREn23I7wbMxCTcDKDD4K6d0LwiANOis5i8ogazfCh7xlM8RpAr455AJ88UlTquYgeF2oAPlJlyMNJq1EGooSmFzq4N6sJAByxxTVXtsxvbSBZoXRun_dBbFhgQt8jvzmUxn48ysVth7uVkkNTAaKkmo0fCljZQy9PjNhRMrmpRl5UvGcOqnz-B0UAyiNefxTs1qZFrzfIjWFNSTbZEWFDbKZd84wsp_UIPUlGsgdcpFjZRRYGYCPgVgZS1jtksdB_747amUNLFocPGls3wfWnXB9bXLP77g-464nqWlqsMkF1-AJC8tiVEnmwz9CuZwJ23O9tq-VY2m4194jGxwrHcJ5UhEp94kB84GTCVYuZmiRP1_qjk25cDoCXqU6IGdLCzH-mCRZ93hcrhZjzgEx8vUZJ99nR4HHJTaHv99yRNbLfXJM1uazhTpBou2Qz4Kvz9MExW-ccj1b\">Embedded Computing for High Performance: Efficient Mapping of Computations Using Customization&#8230;<\/a><\/p>\n<p><a href=\"https:\/\/login.research4life.org\/tacsgr0hinarizw_summon_serialssolutions_com\/2.0.0\/link\/0\/eLvHCXMwtV05T8MwFLaALlRIQAFxK2KAoSpqjsbxwEJPiQlxT5Ud2xDRJlLTgsSv572cJQtiYElbN3JUf-47_b5HiG1dtlsVmcA87mlONVjbSEHHtGUKj9pcUYmEVVg3fPvkjHrWzZ39XLYhLcf-FXgYA-ixkPYP4BeTwgC8hy0AV9gEcK3Yx8XHLMw-FQqEimymfRvyA5N4rgOPvefVAmUOYiajOE3DREn23I7wbMxCTcDKDD4K6d0LwiANOis5i8ogazfCh7xlM8RpAr455AJ88UlTquYgeF2oAPlJlyMNJq1EGooSmFzq4N6sJAByxxTVXtsxvbSBZoXRun_dBbFhgQt8jvzmUxn48ysVth7uVkkNTAaKkmo0fCljZQy9PjNhRMrmpRl5UvGcOqnz-B0UAyiNefxTs1qZFrzfIjWFNSTbZEWFDbKZd84wsp_UIPUlGsgdcpFjZRRYGYCPgVgZS1jtksdB_747amUNLFocPGls3wfWnXB9bXLP77g-464nqWlqsMkF1-AJC8tiVEnmwz9CuZwJ23O9tq-VY2m4194jGxwrHcJ5UhEp94kB84GTCVYuZmiRP1_qjk25cDoCXqU6IGdLCzH-mCRZ93hcrhZjzgEx8vUZJ99nR4HHJTaHv99yRNbLfXJM1uazhTpBou2Qz4Kvz9MExW-ccj1b\">https:\/\/embedded computing for high performance<\/a><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"252\"><\/td>\n<td valign=\"top\" width=\"255\">ARDI<\/td>\n<td valign=\"top\" width=\"567\">Computer\u00a0Science\u00a0and Engineering Education for Pre-collegiate Students and Teachers<\/p>\n<p><a href=\"https:\/\/login.research4life.org\/tacsgr0hinarizw_summon_serialssolutions_com\/2.0.0\/link\/0\/eLvHCXMwpV3fS8MwEA7iXhRhuin-Jv9AtW1qksr0RR0DX5TJ9G1clhSGrJNuIvrXe5e2o4pvPpVLelAu1-NLcvcdYyI-C4NfMSHVoDNQGaJtoqBLszgyWglwyhJhFdUNPz4ng9v4fiheGp2_KMvSzoEA58Lf65NQhvzqsAejZ_F5VUztpRBSYTBuEYkYbcNG0aD2LCE9TtdU3EGMcuiEoWwIUUkRqFeT0U-ZWoK05vDmqNZbVzG13_7Hd26zlqNqhh225vIOa9c9HHj1S3fYZoOQsMtmvRkUr9f1a71zL_JytNKpByG3vKHMV6kiHHEwfyhcMPGHErj2jg9LCs2F16pYpBe7bNS_e7oZBFVDhgAQOEY6cDLRcZYalWncUstJ6lyC-JKWFKQDjFUiNEIbaSZaZAYSJa00Fo0YSlCxE3tsCyhzP1_6Cj-7z7iRE9w0IWqjG0fig7fZhVBgkguDT-sOWNdbflzbd-wNePj38BHbQEiTlockx2x9Wby7E-J-zqGYfn2cerf4BvidvwU\">https:\/\/Computer science and engineering education<\/a><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"252\"><\/td>\n<td valign=\"top\" width=\"255\">ARDI<\/td>\n<td valign=\"top\" width=\"567\">Mobile Cloud Computing: Foundations and Service Models<\/p>\n<p><a href=\"https:\/\/login.research4life.org\/tacsgr0hinarizw_summon_serialssolutions_com\/2.0.0\/link\/0\/eLvHCXMwtV3NS8MwFA_qLorgN84vggcvo9I1XZsIXtymg-FBNr9OI2lT2dw6WVcF_3pf0qzddtKDl9ImkMLvpb_3kvT9HkLEubStJU5glNOI-xFE20qCjkVOVVCfcOmHSrBK5Q0_PLuthtPukJeiEmTR9q-GhzYwvUqk_YPx80GhAe5hCsAVJgFcl-Lj_NGUZxoL-OArwXCc6sS1j3SW2xzllZQyfeYko4usKE5S2NnsJDf6A5hCbzl7p9pbpf1BGs9vGYAbUgcgNDfyvS4YVWnzNBrxOF5YUSp_BasaN0sQXZKinut33QulTT4K-8H0WsbWY2cVlcDd-4plWnevxT4Xc2EJR7WakRm6aoSP8ldtoA2evAOpA-FPk0Wv6BhP1t1GJanyP3bQiox30das6gU2JLiHvAxZrJHFObJXeA5XDLhigyvOcN1HT7fNbr1lmeoTFodllO1bwoFwymV-QImwvcCLgLpYLQyYOpms2kwGlMqaGzrMc2QtgNgHYl_HDhkRIhIkIgdok6s0hXiq0xnDQ4SpIBwiPg5hGXcDCfQXSsIkMGdY84mQZXQ-h0Tvc6iPzJPeAvJlhGcA9XS_-Y-317ypK0G6qseOfjPOMVovZscJWptOUnmqdLJjPul_f51pQ_4AhTAoWg\">https:\/\/Mobile cloud computing<\/a><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"252\"><\/td>\n<td valign=\"top\" width=\"255\">ARDI<\/td>\n<td valign=\"top\" width=\"567\">Object-Oriented Analysis and Design for Information Systems: Modelling with UML, OCL, and IFML<\/p>\n<p><a href=\"https:\/\/login.research4life.org\/tacsgr0hinarizw_summon_serialssolutions_com\/2.0.0\/link\/0\/eLvHCXMwtV05T8MwFLaALiAkblEuWQwsKCiJ3ToRYqEUKjFU0HJNlZ3YUkXJ0AOk_nrec520ZEEMLFHiRDm-57zLfp8JYeGF75V0QhzJyEhhwNtGCrrYhIGKBJNapEhYhXXDDy-8dRPed9jrfPXEedu_Ch7aQPRYSPsH4Rc3hQbYhy4AW-gEsC35x8XhTP5thRkWr408xuhVFuwjs7nHOG_DTjF09UgzxbFAX26T7NOBzJdaf5STwXmnn2a6v5gpCHgpU1CUsORaA_tWKYGfB5ZgtjhS3bESTbU1fM3rBnhxENoGZ8hP_pH2k_GVzrynzjKpgMkXqGlad2_5fw1BTwBeT_HfWzJS4UZTbS4sQL9DWMYj91zuyJGK91gja3L0DoofjMJ49NNyhs76dTdJRWONyBZZ0tk22chXxqDuk3fIZQl9mqNPAX06Q58C7nQBferQ3yXPt81uo-W5ZSo8ifSJNa_OI4gzA-NzqWWoeMwNDuf6xq_7kWIKHAIwb1wYo5IUPD6RsMQobmo-50qBFtwj6xLrGbKxrXtM9wkVkeYMvj_0E0tpF9dMHJqAScMSHYu0Sk4X4Oh9DuzY-qiXYwYxExNVQnOUeva8m_Dbm0vw4PdLDsnqvDcdkZXxcKKPkU47k8P-9OvEyvobkCAzkg\">https:\/\/Object-oriented analysis and design for information<\/a><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"252\"><\/td>\n<td valign=\"top\" width=\"255\">ARDI<\/td>\n<td valign=\"top\" width=\"567\">Computer\u00a0Arithmetic and Formal Proofs: Verifying Floating-Point Algorithms with the Coq System<\/p>\n<p><a href=\"https:\/\/login.research4life.org\/tacsgr0hinarizw_summon_serialssolutions_com\/2.0.0\/link\/0\/eLvHCXMwtV1LS8QwEA4-LoLgG98UD16k2iZ9JKDC-lzQi6zPU0mbhF3cXXXZXdFf70w3bXUv4sFLaNKS0pkh8-jMN4Qwuu-5Y2eC4JIbGRuwthGCThjqpzxmUscKAauwbvjmIaif0asGe6z6d1Vr_8p4WAPWYyHtH5hfbgoLcA0iACMIAYxj9nE5tbADtl3DXg3c_2ZHF8CsF2iktrFAANRf6Yy_tFUeM218tIetKh1Wt98GLdt4-HKADYoGFtzABgr8eCxQUFSw_HAg_ZiDywI2F6v0QZmld35yGiIAIQ93EYe8o1pZ_0h33bvGJJkG1R7jiVK_fCpjWhhIAfML6-eKfSMLq1W-B3R4E1NOv2s-ZrXZ7TyZ1ljjsUAmdHeRzBWkcuxBt0ToYUf2no-LG4cH-dSpSOkAKZ0RKZ0RKZfJ_cX57Wndtd0lXAk2qBe4XNE0Bms2yozxfZGKSBnFJJ7-jHtUqMz3hMxoFkYpOImR5sxwJiMVizQQPGArZFZiGUK3n5crqlXipJrSjFEjBTZ1jkDAQcRDFqZeoKSJsjWyA1-fvI6QRBLE9q7XrhNcA9ubITz-0F8jTkGcJP9lbvN0k4oh678_skFmKinYJFP93kBvIQp2V_Zan-_bOeu-ALZ0HO8\">https:\/\/Computer arithmetic and formal proofs<\/a><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"252\"><\/td>\n<td valign=\"top\" width=\"255\">ARDI<\/td>\n<td valign=\"top\" width=\"567\">Adaptive Mobile Computing: Advances in Processing Mobile Data Sets<\/p>\n<p><a href=\"https:\/\/login.research4life.org\/tacsgr0hinarizw_summon_serialssolutions_com\/2.0.0\/link\/0\/eLvHCXMwtV1LS8QwEA4-Li6Cb3wTvEpl-9hNK3hwfa2IB1FRT0uaJlJdq2y7Cv56Z5I23d2THryUNikp5Esnk-SbbwjxvYOmM2ETopCHijMF3jZK0EXKc-OQ-VyyBAWrMG745iHonnpXt_5jnSeyLvtX4KEMoMdA2j-AbxuFAriHIQBXGARwnfCP7WPJPk74h6YFvb3H8Odr7vjQhjebk3_DITehArhlUL6KrNH9XBbW3b6Wg34VDoOsWVuePvdTHGIm6mc4sDXHfafLXzpg1gyBGxUgZca_jRFDceX86NKqgRb6k44miqaiVJce25CASa4JXV5vSNa8_hEOiVmu4mSIB7H-hPj1e5VdwdRjQmIUPn9LUlEcycy5v50ms-BLMDRh3Ysnu4nmeU3UxdRSSWXTbqmqZD_VIA2ev8KMAbNJkY9PuWFF2rtbJLMSo0uWyJTMlslClVODliZ2mTRGBCJXSKdCkRpoqEXxkFYY0jSjNYbVi9ihFDFcJffnZ3cnXafMeuFwXB0i5xDcKB-WoVKGSiSCRywJmAzbkWz5yg1ZzFqJbPNYgXXGQGChEt52Yxecd9Hi_hqZ5xgdkRU6ijJZJ1SJ0FcCtfrAY4yEFzHXa7KoJeNYgMMtN8jeSB_1Pvv6pD7vjWGyQWjVdT1dX9KHe2edkyAKoOFg8zftbJG5ethsk5liMJQ7KM-d8UH6_bWrIf4B8-tTTA\">https:\/\/Adaptive mobile computing<\/a><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"252\"><\/td>\n<td valign=\"top\" width=\"255\">ARDI<\/td>\n<td valign=\"top\" width=\"567\">Shared Memory Application Programming: Concepts and Strategies in Multicore Application Programming<\/p>\n<p><a href=\"https:\/\/login.research4life.org\/tacsgr0hinarizw_summon_serialssolutions_com\/2.0.0\/link\/0\/eLvHCXMwtV1LS8QwEA7qXgTBN77pRW-VNo8mOXhxXS2IB9n1dVrSJsUFt4dlRfTXO9Pn2ot48FLaUBIyMySTmfm-EMLoeeB31gStjMqMzMDbRgo6ndEwUZIZJy0SViFu-P6Jx1f0dsie2_u72rZ_VTy0geoRSPsH5TedQgO8gwnAE4wAnh3_uPmsIB6vRWn5HVbSfpbOZhmdQ2wAlmRN600L1f2GN6HkFtM5ReXrJC1ZiJuIQCg6EYEGqlKvDmhDnUB9fYDE7SmANaYEcnaYpweXfeQ_i2hwhjzkUwtjX7jcfxgukx5s7RJXlPjmpY1pCQXnXVEwF1X91iRHzTg_9zxWp7lHG6TnEN6xSZZcvkXW60stvGoW2-S0FJxXCs5bEJy3ILgd8ng9GPVjv7pLwjeYKRW-TkJpg0QJzk3CVOAyikaYWqpdIsEykwjObppxapzTKuSZYJEF91llyqXasV2yZhB0kM8LcKLdI55QWnCaOPCiOKfg2lmZOpUF4PKJKOVsn3j1XMdF7rsquB23kj34_ZdDstpq-YiszGfv7hjprHMzm3x9nBQ6-AZEBgtz\">https:\/\/Shared memory application programming<\/a><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"252\"><\/td>\n<td valign=\"top\" width=\"255\">ARDI<\/td>\n<td valign=\"top\" width=\"567\">Editorial Adaptive and reconfigurable software systems and architectures<\/p>\n<p><a href=\"https:\/\/login.research4life.org\/tacsgr0hinarizw_summon_serialssolutions_com\/2.0.0\/link\/0\/eLvHCXMwtV3PT9swFLYGuyAhsR9M_BhTtAMXFJTYrpMcdmCDrdOQKlYKu1V27LRBtKC0HdL--r1nO-kPdhgHLlFqRVGT9_Tl8_P7PhPC6HEUrmBClsq0kEkBbBst6LKCxipNmDSJRsMq1A1fXPP2Kf3RZb_mle352LMGHsYg9CikfULwm5vCAJxDCsARkgCOK_y4-enL7LpE_w-MgJb3tkHItpLjBLgoB7PKaqYmgMIP2PzlHJ2dYfPi4sJ8rQc3XbH14u5tOWpm8XczYN-llkc_73Q1KweuIP19Mlro3Titysopz4bA-m8XCw2x3Z7HaYFd9ct_qheLkQI9D30btHEAClGFMS_4rhHWSY89RjJO60YOxpxH0yMcdyWFm-ObCVqqx8J60XpUXvLMvup0PGt-7JrdPjnvw3P1YRYIKMqj3_Eh-qmPdJlPP5lx2OuukbU0AnR8efKt97nTfMETantVm-erV8NtX-DKXwJOMrQ1-Kxesb98RdZRqPKavDDjN2Sr3p4j8Gj9lrSbFAjqFAggvMFyCgR1CgQ-Bew1SymwTXpfzy6_tEO_cUY4BLqsw4QxFeW54Arm95nQWUKlFEIqlSFnyZSSsVBAjVWLKhYZLlGendNcSGFSlbN3ZFOiwGI8tUJMvUOCVpq1OFUGGCPnFGisTnKTFhHQ25bIOdslH_Fd3zuPlP6_3__e_1y0Tzbm6feerE-rmTlA--6xrMo_Dx98tP4CZJZaQQ\">https:\/\/Editorial adaptive and reconfigurable software systems<\/a><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"252\"><strong>Electronics and Telecommunications<\/strong><\/td>\n<td valign=\"top\" width=\"255\">ARDI<\/td>\n<td valign=\"top\" width=\"567\">Telecommunication\u00a0Economics: Selected Results of the COST Action ISO605 <a href=\"mailto:Econ@Tel&lt;\/span\">Econ@Tel&gt;<\/a><\/p>\n<p><a href=\"https:\/\/login.research4life.org\/tacsgr0hinarizw_summon_serialssolutions_com\/2.0.0\/link\/0\/eLvHCXMwtV3dS8MwEA9-PKj4oFPxmz2JINW1SZsUpg_OycAn2aa-jaRJYIxVqBPBv9672C82QXzwpbShSWku5O5y9_sdITS4bHlze4LisfQ51ZGWYCD4lEkeW2a54VxqLhGc_PjMenfBQ5--VMVCq7Z_FTy0gegRSPsH4ZeDQgPcwxKAKywCuM7Zx-VjLn8scFNHf5QY5LdKlCCycQ65qiW3Y6X0tODjlRPzWgXqkfE4KyIHtn5k4HIv6kcGxZHhRc6ohfzoP7FqOYQHmFsYTGSVviiz-Lq3HdwxRBidIU_5VI-T2bVJvWF_mSyLFtaTePJ75YkXekpURAiwKUb1vymQqq8saESn5gdbZNUg9mObLJm0QdbKCWuQjRpv4w45b09lNrlZmOL2lWtvlh13yfC-O-j0vLzkhCeDCFxHT0ihuIiiWNlAMSpCQy3jCoweXymhOdI6M5nEXIJ-t742JmQ2dGauAQ-A7pFNidCEdOYgjHqfNMEpUwmsdqZEwqRU0De0OkmsCVTCWXhAmsU_j1yEPE_LHVXze_j7K0dkvRL1MVmZZe_mBEmvU5mNPz9OnSy-AHWSGXA\">https:\/\/Telecommunication economics<\/a><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"252\"><\/td>\n<td valign=\"top\" width=\"255\">ARDI<\/td>\n<td valign=\"top\" width=\"567\"><a href=\"https:\/\/login.research4life.org\/tacsgr0hinarizw_summon_serialssolutions_com\/2.0.0\/link\/0\/eLvHCXMwtV07T8MwEDaFLiAGnoLyUPcqpXHsOJEKC69KTNAiYKrOLwlBMyRFQH895zSkaZGQGFisxNZZyZ1zvnP8fSYkoO2Ot-ATpIjBF4EONWCA4AcMRGyZFUYI0AIcOPn2gfUu6E0_eKwtTQrDz-r-1fBYh6Z3QNo_GL_sFCvwGocAljgIsFyIj8vbwv7ugJsq-iND3zL6zNzeoALQlP96SF9bd210slkGaXUJwM83k9FZwojuMDHfS3vTxNCP3Ico-JTUdYFRer7dUYyP9LMan5rEu-8vkzrO2sI5i971U7lc1cFMFn1RDsIvRKOCMavsyrGtgsUUHyczXszQgw1SNw62sUlqJtkiaxWaxW3S6o4gfTn7qZHuSd7QrChmhwyuLgfnPa84JMKzPqUfXsRjZYPQmhgjb85ljA_PlQoN8DBSRofcakMt7yiFAkJYSf0QuAoMZRa9zy5ZB4clSMY55lDvkSZmUVLh8GQyUgxAxgKwE5Q3VCrB-D5pTN9z6CybDeeU0Pit8YCszux3SFbG6Zs5cszUCQpM3o9znX8BtF34lQ\">Telecommunications\u00a0Demystified<\/a><\/p>\n<p><a href=\"https:\/\/login.research4life.org\/tacsgr0hinarizw_summon_serialssolutions_com\/2.0.0\/link\/0\/eLvHCXMwtV07T8MwEDaFLiAGnoLyUPcqpXHsOJEKC69KTNAiYKrOLwlBMyRFQH895zSkaZGQGFisxNZZyZ1zvnP8fSYkoO2Ot-ATpIjBF4EONWCA4AcMRGyZFUYI0AIcOPn2gfUu6E0_eKwtTQrDz-r-1fBYh6Z3QNo_GL_sFCvwGocAljgIsFyIj8vbwv7ugJsq-iND3zL6zNzeoALQlP96SF9bd210slkGaXUJwM83k9FZwojuMDHfS3vTxNCP3Ico-JTUdYFRer7dUYyP9LMan5rEu-8vkzrO2sI5i971U7lc1cFMFn1RDsIvRKOCMavsyrGtgsUUHyczXszQgw1SNw62sUlqJtkiaxWaxW3S6o4gfTn7qZHuSd7QrChmhwyuLgfnPa84JMKzPqUfXsRjZYPQmhgjb85ljA_PlQoN8DBSRofcakMt7yiFAkJYSf0QuAoMZRa9zy5ZB4clSMY55lDvkSZmUVLh8GQyUgxAxgKwE5Q3VCrB-D5pTN9z6CybDeeU0Pit8YCszux3SFbG6Zs5cszUCQpM3o9znX8BtF34lQ\">https:\/\/Telecommunications demystified<\/a><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"252\"><\/td>\n<td valign=\"top\" width=\"255\">ARDI<\/td>\n<td valign=\"top\" width=\"567\"><a href=\"https:\/\/login.research4life.org\/tacsgr0hinarizw_summon_serialssolutions_com\/2.0.0\/link\/0\/eLvHCXMwtV1Rb9MwED4BexgICRggOgbkHWXYsRMnYvBAGRRNCKEW2J6ic5xoUVcjNa1A_HrObpq0RULigZco8cWOdHe6u5z93QGI6JiFOzZBqwy5EiYxSAECFxJVVslKlUqhUejAyZ-_ydHb6GwszvvGoP3YfxU8jZHoHZD2H4TfLUoDdE8qQFdSArruxMfdY7tDW38PP1i3j-5yuL53A64PNk5c85tNZEgXWF-06ePz2objy07ow8t6ZZ7Gy-5Xv22GMjn-tJk54B6JzfvMwUffN-r5GS6rGVq79WPp3BZzxlD2fqI7vcfz7TdckfKZqYvFq9KGX8bXYY_8vnLmZvT-ok94ySRRkvmyRu1U3lZA6pbaDvMbrHBe34L9ZlpfXTXkllZ1vLwnm9yFvdLhQe7BtdIewJ11F4ygNYoHsL_Gdjf34eUm14MNrge1DU5mOJ--_pP3Jy884QF8fXc6GY7Ctj1FiDIjsxfGGKHIKhFlNEBKXaUpL2SmtTaYiMSklZJxxIwwOtWlIZ0vkQnBitgUiaLY-yHcRodjsAuPdzSPIBAlxWQ8xYjCOKnpAyZjMSuigtG0WGcDCNYcyv12enuGNz99M3TQz0SJARytOJc7epPviGsAh1vkHeKzjtkreiR_qlxPGx88cpYe_n31x3CzV7UjuLGYL8snrva2pSm_fjz1OvEbSSk_SA\">Bio-Inspired Computation in\u00a0Telecommunications<\/a><\/p>\n<p><a href=\"https:\/\/login.research4life.org\/tacsgr0hinarizw_summon_serialssolutions_com\/2.0.0\/link\/0\/eLvHCXMwtV1Rb9MwED4BexgICRggOgbkHWXYsRMnYvBAGRRNCKEW2J6ic5xoUVcjNa1A_HrObpq0RULigZco8cWOdHe6u5z93QGI6JiFOzZBqwy5EiYxSAECFxJVVslKlUqhUejAyZ-_ydHb6GwszvvGoP3YfxU8jZHoHZD2H4TfLUoDdE8qQFdSArruxMfdY7tDW38PP1i3j-5yuL53A64PNk5c85tNZEgXWF-06ePz2objy07ow8t6ZZ7Gy-5Xv22GMjn-tJk54B6JzfvMwUffN-r5GS6rGVq79WPp3BZzxlD2fqI7vcfz7TdckfKZqYvFq9KGX8bXYY_8vnLmZvT-ok94ySRRkvmyRu1U3lZA6pbaDvMbrHBe34L9ZlpfXTXkllZ1vLwnm9yFvdLhQe7BtdIewJ11F4ygNYoHsL_Gdjf34eUm14MNrge1DU5mOJ--_pP3Jy884QF8fXc6GY7Ctj1FiDIjsxfGGKHIKhFlNEBKXaUpL2SmtTaYiMSklZJxxIwwOtWlIZ0vkQnBitgUiaLY-yHcRodjsAuPdzSPIBAlxWQ8xYjCOKnpAyZjMSuigtG0WGcDCNYcyv12enuGNz99M3TQz0SJARytOJc7epPviGsAh1vkHeKzjtkreiR_qlxPGx88cpYe_n31x3CzV7UjuLGYL8snrva2pSm_fjz1OvEbSSk_SA\">https:\/\/Bio-inspired computation in telecommunications<\/a><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"252\"><\/td>\n<td valign=\"top\" width=\"255\">ARDI<\/td>\n<td valign=\"top\" width=\"567\"><a href=\"https:\/\/login.research4life.org\/tacsgr0hinarizw_summon_serialssolutions_com\/2.0.0\/link\/0\/eLvHCXMwtV3PT9swFLb4cWDTDmwwAdtYLuyCihInrt0DF9JCJQ4IlY3tVL0kjgiFZGqDgP71vJe4TtsL4sAlip3IUfu92N-z_X1hzOdHbmupT4hkBzzpJ-0EkCB4fgCykwap1FJCIoHEyZfXQb_Lzwf-38YBuKl7V-CxDqEnIe0bwLeNYgWeYwjgEYMAj0v82BaN7UBR_NfG1rvWrs32CU2gcuEstbFxtqw6vIFymuVFWYu8Bs_3ulmkv6h8OMu6lzq5LQ7C8ECpsb3exXAD8smcZkawH2PwFfOzCp5YmlVoNudXgpWM_KJJtznO6g0KMznMQjZKq9jINwMzgi7aWEcjTXwD0z35i1zN75MsLo913vo9WGXrSBQk9U_9s3_NDJnwBSaDlQ-SaVjUBUXE1JPGP8k-1Zbr63whadiYjLK7uwmObTjUts1weLXJ1jWJSj6zFZ1_YR_nTCC32OEcUg4i5VikHIuUY5DaZn9Oe1dhv2U-YdECTFyFohlW5UHVTUoOCZLXGEk2l1EgkAlGAfk3RiDcNOWpiiCGVLV9NyW_VqWQrflf2ScgrUNeVprIZIc5vkbe5ingSPWCCLDZjivcmMeuGwsRdXaZM_vdw2rJ3ezzHfZOQo6vH75_u-yn_T-GdMuEB09yOAfS3qt3fGMfmsj5ztbK8YP-QTbbOYyz6eN-heYLoK06oA\">Cooperative and Cognitive Satellite Systems<\/a><\/p>\n<p><a href=\"https:\/\/login.research4life.org\/tacsgr0hinarizw_summon_serialssolutions_com\/2.0.0\/link\/0\/eLvHCXMwtV3PT9swFLb4cWDTDmwwAdtYLuyCihInrt0DF9JCJQ4IlY3tVL0kjgiFZGqDgP71vJe4TtsL4sAlip3IUfu92N-z_X1hzOdHbmupT4hkBzzpJ-0EkCB4fgCykwap1FJCIoHEyZfXQb_Lzwf-38YBuKl7V-CxDqEnIe0bwLeNYgWeYwjgEYMAj0v82BaN7UBR_NfG1rvWrs32CU2gcuEstbFxtqw6vIFymuVFWYu8Bs_3ulmkv6h8OMu6lzq5LQ7C8ECpsb3exXAD8smcZkawH2PwFfOzCp5YmlVoNudXgpWM_KJJtznO6g0KMznMQjZKq9jINwMzgi7aWEcjTXwD0z35i1zN75MsLo913vo9WGXrSBQk9U_9s3_NDJnwBSaDlQ-SaVjUBUXE1JPGP8k-1Zbr63whadiYjLK7uwmObTjUts1weLXJ1jWJSj6zFZ1_YR_nTCC32OEcUg4i5VikHIuUY5DaZn9Oe1dhv2U-YdECTFyFohlW5UHVTUoOCZLXGEk2l1EgkAlGAfk3RiDcNOWpiiCGVLV9NyW_VqWQrflf2ScgrUNeVprIZIc5vkbe5ingSPWCCLDZjivcmMeuGwsRdXaZM_vdw2rJ3ezzHfZOQo6vH75_u-yn_T-GdMuEB09yOAfS3qt3fGMfmsj5ztbK8YP-QTbbOYyz6eN-heYLoK06oA\">https:\/\/Cooperative and cognitive satellite systems<\/a><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"252\"><\/td>\n<td valign=\"top\" width=\"255\">ARDI<\/td>\n<td valign=\"top\" width=\"567\"><a href=\"https:\/\/login.research4life.org\/tacsgr0hinarizw_summon_serialssolutions_com\/2.0.0\/link\/0\/eLvHCXMwtV1LT8MwDLaAXZg48BRvVRyQkFhpl24haHDgWYkLaEPAacrWRIyxHtYOJH49Tpam3TgABy5Rm6ZRZLu2k_qzAUjV9SpTOqFDGfcpieoRRwfBJwGnTAaSCkp5RLkCJ98_BuFl9bZJnvJKk3nfvzIe-5D1Ckj7B-bbSbEDr1EEsEUhwHbKP7a3WWx6Vu5UR7y2VL2bIhgkcfWZoA2P15ARoy1GrvW0VXhMkvAXE1FrpM4cE_i6YomXbyotfsWojIltJA5XRUc8A9M2evEudc_d3EzY4D31AkG3UBUtDvZVhvJB1OumpyKuPDRnoYRGnypdE948Z1-2r7Lc1TyrSQj6maxmELKvYz8VPUOmcx6ZtWTpkezaylDmSR9VP5qFNBmn9NLGrbUIJaGgIUswI-JlKBdSOa5AWKC304udxoAP-2ffqd440g_cEycjvaNJ7yjSHyLhV-Hg-qp1EVYKq2i_v-mf2kl7gipkDRa4QijEqUYyRuvg1CN0pxjpiIDLoE66zJcRFbJTZR6V8ri2AXs_T7z5m0FbMJ9LwDbMpcOR2FH5r2M-7H1-7GrWfAE7Bhz7\">Innovations in\u00a0Telecommunications.: Academic Press Inc.u.s<\/a><\/p>\n<p><a href=\"https:\/\/login.research4life.org\/tacsgr0hinarizw_summon_serialssolutions_com\/2.0.0\/link\/0\/eLvHCXMwtV1LT8MwDLaAXZg48BRvVRyQkFhpl24haHDgWYkLaEPAacrWRIyxHtYOJH49Tpam3TgABy5Rm6ZRZLu2k_qzAUjV9SpTOqFDGfcpieoRRwfBJwGnTAaSCkp5RLkCJ98_BuFl9bZJnvJKk3nfvzIe-5D1Ckj7B-bbSbEDr1EEsEUhwHbKP7a3WWx6Vu5UR7y2VL2bIhgkcfWZoA2P15ARoy1GrvW0VXhMkvAXE1FrpM4cE_i6YomXbyotfsWojIltJA5XRUc8A9M2evEudc_d3EzY4D31AkG3UBUtDvZVhvJB1OumpyKuPDRnoYRGnypdE948Z1-2r7Lc1TyrSQj6maxmELKvYz8VPUOmcx6ZtWTpkezaylDmSR9VP5qFNBmn9NLGrbUIJaGgIUswI-JlKBdSOa5AWKC304udxoAP-2ffqd440g_cEycjvaNJ7yjSHyLhV-Hg-qp1EVYKq2i_v-mf2kl7gipkDRa4QijEqUYyRuvg1CN0pxjpiIDLoE66zJcRFbJTZR6V8ri2AXs_T7z5m0FbMJ9LwDbMpcOR2FH5r2M-7H1-7GrWfAE7Bhz7\">https:\/\/Innovations in telecommunications<\/a><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"252\"><\/td>\n<td valign=\"top\" width=\"255\">Wiley<\/td>\n<td valign=\"top\" width=\"567\">Broadband Telecommunications Technologies and Management<\/p>\n<p><a href=\"https:\/\/onlinelibrary.wiley.com\/doi\/book\/10.1002\/9781119114956\">https:\/\/onlinelibrary.wiley.com\/doi\/book\/10.1002\/9781119114956<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;E-Journals Available&#8221; tab_id=&#8221;1648807308231-98fa46ce-44f9&#8243;][vc_column_text]<strong>Faculty of Computer Engineering Informatics and Communications Core Textbooks<\/strong><strong>\u00a0<\/strong><\/p>\n<table width=\"100%\">\n<tbody>\n<tr>\n<td width=\"29%\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-10772\" src=\"http:\/\/10.12.1.49\/wp-content\/uploads\/2022\/10\/111-196x300.png\" alt=\"\" width=\"150\" height=\"229\" srcset=\"https:\/\/library.uz.ac.zw\/wp-content\/uploads\/2022\/10\/111-196x300.png 196w, https:\/\/library.uz.ac.zw\/wp-content\/uploads\/2022\/10\/111.png 216w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/td>\n<td width=\"70%\"><strong><a href=\"http:\/\/uzlibsys.uz.ac.zw\/cgi-bin\/koha\/opac-detail.pl?biblionumber=48976\">\u00a0Cloud computing: Principles and Paradigms<\/a>&#8211;<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p>2011<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p>The primary purpose of this book is to capture the state-of-the-art in Cloud Computing technologies and applications. The book will also aim to identify potential research directions and technologies that will facilitate creation a global market-place of cloud computing services supporting scientific, industrial, business, and consumer applications. We expect the book to serve as a reference for larger audience such as systems architects, practitioners, developers, new researchers and graduate level students. This area of research is relatively recent, and as such has no existing reference book that addresses it.<\/td>\n<\/tr>\n<tr>\n<td width=\"29%\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-10773\" src=\"http:\/\/10.12.1.49\/wp-content\/uploads\/2022\/10\/2222.png\" alt=\"\" width=\"150\" height=\"231\" \/><\/td>\n<td width=\"70%\"><a href=\"http:\/\/uzlibsys.uz.ac.zw\/cgi-bin\/koha\/opac-detail.pl?biblionumber=76055&amp;query_desc=kw%2Cwrdl%3A%20Cloud%20computing\"><strong>Guide to computer network security<\/strong><\/a><\/p>\n<p>2017<\/p>\n<p>This definitive text\/reference on computer network and information security presents a comprehensive guide to the repertoire of security tools, algorithms and best practices mandated by the rapidly evolving ubiquitous technology we are increasingly dependent on. Fully revised and updated, this timely new edition encompasses the latest developments in system resource virtualization, cloud computing models, and mobile computing technology, including a new chapter on the Internet of Things.<\/td>\n<\/tr>\n<tr>\n<td width=\"29%\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-10774\" src=\"http:\/\/10.12.1.49\/wp-content\/uploads\/2022\/10\/333.png\" alt=\"\" width=\"150\" height=\"185\" \/><\/td>\n<td width=\"70%\"><strong><a href=\"http:\/\/uzlibsys.uz.ac.zw\/cgi-bin\/koha\/opac-detail.pl?biblionumber=49136&amp;query_desc=kw%2Cwrdl%3A%20Software%20Engineering\">Software Engineering<\/a> <\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p>2015<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p>Software Engineering introduces readers to the overwhelmingly important subject of software programming and development. In the past few years, computer systems have come to dominate not just our technological growth, but the foundations of our world\u2019s major industries. This text seeks to lay out the fundamental concepts of this huge and continually growing subject area in a clear and comprehensive manner.<\/td>\n<\/tr>\n<tr>\n<td width=\"29%\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-10776\" src=\"http:\/\/10.12.1.49\/wp-content\/uploads\/2022\/10\/422.png\" alt=\"\" width=\"150\" height=\"181\" \/><\/td>\n<td width=\"70%\"><strong><a href=\"http:\/\/uzlibsys.uz.ac.zw\/cgi-bin\/koha\/opac-detail.pl?biblionumber=49172\">Data Mining: Practical Machine Learning Tools and Techniques<\/a> <\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>2011<\/p>\n<p>Data Mining: Practical Machine Learning Tools and Techniques, Fourth Edition, offers a thorough grounding in machine learning concepts, along with practical advice on applying these tools and techniques in real-world data mining situations. This highly anticipated fourth edition of the most acclaimed work on data mining and machine learning teaches readers everything they need to know to get going, from preparing inputs, interpreting outputs, evaluating results, to the algorithmic methods at the heart of successful data mining approaches.<\/p>\n<p>&nbsp;<\/td>\n<\/tr>\n<tr>\n<td width=\"29%\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-10777\" src=\"http:\/\/10.12.1.49\/wp-content\/uploads\/2022\/10\/909-235x300.png\" alt=\"\" width=\"150\" height=\"192\" srcset=\"https:\/\/library.uz.ac.zw\/wp-content\/uploads\/2022\/10\/909-235x300.png 235w, https:\/\/library.uz.ac.zw\/wp-content\/uploads\/2022\/10\/909.png 308w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/td>\n<td width=\"70%\"><strong><a href=\"http:\/\/uzlibsys.uz.ac.zw\/cgi-bin\/koha\/opac-detail.pl?biblionumber=49196&amp;query_desc=kw%2Cwrdl%3A%20Fundamentals%20of%20Database%20Systems\">Fundamentals of Database Systems<\/a> <\/strong><\/p>\n<p>2014<\/p>\n<p>This book introduces the fundamental concepts necessary for designing, using, and implementing database systems and database applications. Our presentation stresses the fundamentals of database modeling and design, the languages and models provided by the database management systems, and database system implementation techniques. The book is meant to be used as a textbook for a one- or two-semester course in database systems at the junior, senior, or graduate level, and as a reference book<\/p>\n<p>&nbsp;<\/td>\n<\/tr>\n<tr>\n<td width=\"29%\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-10779\" src=\"http:\/\/10.12.1.49\/wp-content\/uploads\/2022\/10\/6666.png\" alt=\"\" width=\"150\" height=\"186\" \/><\/td>\n<td width=\"70%\"><strong><a href=\"http:\/\/uzlibsys.uz.ac.zw\/cgi-bin\/koha\/opac-detail.pl?biblionumber=49147&amp;query_desc=kw%2Cwrdl%3A%20Computer%20Organisation%20and%20Design\">Computer Organisation and Design<\/a><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>2006<\/p>\n<p>Computer Organization and Design: The Hardware\/Software Interface, Sixth Edition, the leading, award-winning textbook from Patterson and Hennessy used by more than 40,000 students per year, continues to present the most comprehensive and readable introduction to this core computer science topic. Improvements to this new release include new sections in each chapter on Domain Specific Architectures (DSA) and updates on all real-world examples that keep it fresh and relevant for a new generation of students.<\/p>\n<p>&nbsp;<\/td>\n<\/tr>\n<tr>\n<td width=\"29%\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-10784\" src=\"http:\/\/10.12.1.49\/wp-content\/uploads\/2022\/10\/hdf.png\" alt=\"\" width=\"150\" height=\"224\" \/><\/td>\n<td width=\"70%\"><strong><a href=\"http:\/\/uzlibsys.uz.ac.zw\/cgi-bin\/koha\/opac-detail.pl?biblionumber=88524\">Rethinking IT in Construction and Engineering<\/a> <\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>2007<\/p>\n<p>Based on the author&#8217;s twenty years research experience, this book provides a holistic picture of the factors that enable architecture, construction and engineering organisations to explore the potential of IT to improve their businesses and achieve a sustainable competitive advantage.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/td>\n<\/tr>\n<tr>\n<td width=\"29%\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-10782\" src=\"http:\/\/10.12.1.49\/wp-content\/uploads\/2022\/10\/88888.png\" alt=\"\" width=\"150\" height=\"204\" \/><\/td>\n<td width=\"70%\"><strong><a href=\"http:\/\/uzlibsys.uz.ac.zw\/cgi-bin\/koha\/opac-detail.pl?biblionumber=48969&amp;query_desc=kw%2Cwrdl%3A%20Cloud%20computing\">Cloud computing : concepts, technology, &amp; architecture<\/a> <\/strong><\/p>\n<p>2013<\/p>\n<p>Clouds are distributed technology platforms that leverage sophisticated technology innovations to provide highly scalable and resilient environments that can be remotely utilized by organizations in a multitude of powerful ways. To successfully build upon, integrate with, or even create a cloud environment requires an understanding of its common inner mechanics, architectural layers, and models, as well as an understanding of the business and economic factors that result from the adoption and real-world use of cloud-based services<\/p>\n<p>&nbsp;<\/td>\n<\/tr>\n<tr>\n<td width=\"29%\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-10783\" src=\"http:\/\/10.12.1.49\/wp-content\/uploads\/2022\/10\/99999-199x300.png\" alt=\"\" width=\"150\" height=\"226\" srcset=\"https:\/\/library.uz.ac.zw\/wp-content\/uploads\/2022\/10\/99999-199x300.png 199w, https:\/\/library.uz.ac.zw\/wp-content\/uploads\/2022\/10\/99999.png 221w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/td>\n<td width=\"70%\"><strong><a href=\"http:\/\/uzlibsys.uz.ac.zw\/cgi-bin\/koha\/opac-detail.pl?biblionumber=76055&amp;query_desc=kw%2Cwrdl%3A%20computer%20networks\">Guide to Computer Network security<\/a><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>2017<\/p>\n<p>&nbsp;<\/p>\n<p>This timely textbook presents a comprehensive guide to the core topics in cybersecurity, covering issues of security that extend beyond traditional computer networks to the ubiquitous mobile communications and online social networks that have become part of our daily lives. In the context of our growing dependence on an ever-changing digital ecosystem, this book stresses the importance of security awareness, whether in our homes, our businesses, or our public spaces. This fully updated new edition features new material on the security issues raised by blockchain technology, and its use in logistics, digital ledgers, payments systems, and digital contracts.<\/p>\n<p>&nbsp;<\/td>\n<\/tr>\n<tr>\n<td width=\"29%\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-10785\" src=\"http:\/\/10.12.1.49\/wp-content\/uploads\/2022\/10\/ter.png\" alt=\"\" width=\"150\" height=\"240\" \/><\/td>\n<td width=\"70%\"><strong><a href=\"http:\/\/uzlibsys.uz.ac.zw\/cgi-bin\/koha\/opac-detail.pl?biblionumber=47648&amp;query_desc=kw%2Cwrdl%3A%20computer%20systems\">Intelligence and Security Informatics: Techniques and Applications<\/a> <\/strong><\/p>\n<p>2008<\/p>\n<p>This book, <em>INTELLIGENCE and SECURITY INFORMATICS: TECHNIQUES &amp; APPLICATIONS,<\/em> presents a collection of works discussing terrorism informatics, information sharing, data mining, intelligence and crime analysis, infrastructure protection, privacy protection, information surveillance, and emergency response. The authors come from nine different countries and contribute a total of twenty-two chapters of advanced and high-impact ISI research<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;New Books&#8221; tab_id=&#8221;1648807308411-94ee244d-ffee&#8221;][\/vc_tta_section][vc_tta_section title=&#8221;Open Access Resources&#8221; tab_id=&#8221;1648807308567-8cd09d98-a454&#8243;][vc_column_text]<\/p>\n<table class=\"AC_table\" border=\"0\" width=\"100%\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td class=\"hyphenate\" width=\"100%\"><strong>Open Access resources<\/strong><\/p>\n<p>1. Directory of Open Access Journals (DOAJ)<\/p>\n<p>2. <a href=\"http:\/\/www.sagepub.com\/oa\/journals.cp\">Sage Open <\/a><\/p>\n<p>3. <a href=\"http:\/\/www.springeropen.com\/\">SpringerOpen <\/a><\/p>\n<p>4. <a href=\"http:\/\/www.wileyopenaccess.com\/\">Wiley Open Access<\/a><\/p>\n<p>&nbsp;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Training Services&#8221; tab_id=&#8221;1648807308866-02c4cc24-f9d4&#8243;][vc_column_text]The following training services are offered by the library:<\/p>\n<p>&nbsp;<\/p>\n<ol>\n<li><strong>Reference Management<\/strong>-referencing, citation and use of electronic reference management software Mendeley and discipline specific citation styles.<\/li>\n<li><strong>Literature discovery<\/strong>&#8211; identifying research topics; planning and performing a literature review; running effective searches using e-resources and staying up to date with chosen research topic.<\/li>\n<li><strong>Tools for research Collaboration<\/strong>&#8211; using writing collaborative tools such as Google Docs, literature searching collaborative tools like Mendeley, ResearchGate and Academia and using tools for connecting with other researchers.<\/li>\n<li><strong>Research Impact tracking<\/strong>&#8211; Use of citations and alternative metrics to track research impact using tools such as Google Citations and Social Media metrics<\/li>\n<li><strong>Strategies to increase research visibility and discoverability<\/strong>&#8211; how to increase the visibility of research outputs through the use of institutional repositories; sharing preprints, establishing online researcher profiles and using social media for research.<\/li>\n<li><strong>Publishing in reputable journals<\/strong>&#8211; selecting a book publisher and selecting a journal, differentiating predatory, accredited journals, and Open Access routes to getting research output more visible and citable.<\/li>\n<\/ol>\n<ol start=\"7\">\n<li><strong>Research Communication<\/strong>-the training equips researchers on how to communicate their research to a broader audience so as to achieve optimum impact of research findings. It also explores the various ways in which research can be shared.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p>Available trainings can be booked here: <a href=\"https:\/\/forms.gle\/zkeJRkE1JphNG92f7\">https:\/\/forms.gle\/zkeJRkE1JphNG92f7<\/a>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Ethesis and Dissertations&#8221; tab_id=&#8221;1648807309115-ad66c1b1-279e&#8221;][vc_column_text]<strong>How to find Computer Engineering, Informatics and Communications thesis and dissertations in UZ Libraries.<\/strong><\/p>\n<p>Master\u2019s and Doctoral theses from the Faculty of Computer Engineering, Informatics and Communications that have been submitted to UZ Library are for most part, available electronically through the UZescholar Institutional Repository<\/p>\n<p>Faculty of Computer Engineering, Informatics and Communications thesis can be located by searching the institutional repository using this link:<\/p>\n<p><a href=\"https:\/\/ir.uz.ac.zw\">https:\/\/ir.uz.ac.zw<\/a><\/p>\n<p>Other UZ theses can also be found through searching the repository by issue date, author, title and subject. Alternatively use a community search including the title of the community for example \u201cFaculty of the Faculty of Computer Engineering, Informatics and Communications &#8220;.<\/p>\n<p>In general, UZ Libraries does not keep Undergraduate theses although departments often keep their own copies but these are not reflected in the Libraries&#8217; catalogue.[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Referencing and Citation&#8221; tab_id=&#8221;1648807309431-ad99a88a-3e83&#8243;][vc_column_text]The procedure utilised to acknowledge the sources you have used in writing up your assignments or projects is referred to as referencing (also known as citation). You can incorporate the work of others in your references or borrowings without being accused of plagiarizing. The act of using someone else&#8217;s creative efforts, such as research, writings, and ideas, and passing them off as your own is known as plagiarism. The University of Zimbabwe views this as a serious offense and a dishonest act. It&#8217;s critical to properly cite and reference the sources used in scholarly work in order to prevent plagiarism.<\/p>\n<p>Referencing and citation consists of two elements:<\/p>\n<ul>\n<li>In-text citations in the body of the paper with the last name of the author(s) and the year of publication<\/li>\n<li>An alphabetically arranged reference list at the end of the paper giving full bibliographic details for the in-text citations of the sources you have used in your write up.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>The Faculty of Computer Engineering, informatics and Communications uses the Harvard citation style. This refers\u00a0to the standards and practices established for scholarly writing and crediting the sources utilised in a task or academic project.<\/p>\n<p>View the Harvard reference management guide by clicking this link:<\/p>\n<p><a href=\"https:\/\/www.open.ac.uk\/library\/referencing-and-plagiarism\/quick-guide-to-harvard-referencing-cite-them-right\">https:\/\/www.open.ac.uk\/library\/referencing-and-plagiarism\/quick-guide-to-harvard-referencing-cite-them-right<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>For individual or group sessions on using the citation style, book an appointment with your Faculty Subject Information Specialist on this email: smlalazi@uzlib.uz.ac.zw<\/p>\n<p><strong>\u00a0Online Reference Management<\/strong><\/p>\n<p>Faculty Subject Information Specialists also teach students how to manage their referencing and citations using the free reference management program Mendeley. This citation management and academic social network may also assist with a wide range of tasks, including creating and managing citations, organizing your research, collaborating online, finding pertinent papers based on what you are reading, and learning about the most recent research. For training you can book an appointment on this email smlalazu\u201duzlib.uz.ac.zw<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>Featured books in our <\/strong><a href=\"http:\/\/uzlibsys.uz.ac.zw\/\"><strong>Print collection<\/strong><\/a><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"309\"><strong> <img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-11305\" src=\"http:\/\/10.12.1.49\/wp-content\/uploads\/2023\/02\/wwrww-235x300.jpg\" alt=\"\" width=\"235\" height=\"300\" srcset=\"https:\/\/library.uz.ac.zw\/wp-content\/uploads\/2023\/02\/wwrww-235x300.jpg 235w, https:\/\/library.uz.ac.zw\/wp-content\/uploads\/2023\/02\/wwrww.jpg 299w\" sizes=\"auto, (max-width: 235px) 100vw, 235px\" \/><\/strong><\/p>\n<p><em>Principles of Information Systems by Ralph Stair and George Reynolds<\/em><\/p>\n<p><strong>Call Number<\/strong>: T.56.6 STAR<\/td>\n<td width=\"307\"><em><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-11306\" src=\"http:\/\/10.12.1.49\/wp-content\/uploads\/2023\/02\/regeg-232x300.jpg\" alt=\"\" width=\"232\" height=\"300\" srcset=\"https:\/\/library.uz.ac.zw\/wp-content\/uploads\/2023\/02\/regeg-232x300.jpg 232w, https:\/\/library.uz.ac.zw\/wp-content\/uploads\/2023\/02\/regeg.jpg 299w\" sizes=\"auto, (max-width: 232px) 100vw, 232px\" \/><\/strong>Management Information Systems: Managing the Digital Firm by Kenneth Laudon and Jane P. Laudon<\/em><\/p>\n<p><strong>Call Number<\/strong>: T58.6LAU<\/td>\n<\/tr>\n<tr>\n<td width=\"309\"><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-11299\" src=\"http:\/\/10.12.1.49\/wp-content\/uploads\/2023\/02\/dgeg-258x300.jpg\" alt=\"\" width=\"258\" height=\"300\" srcset=\"https:\/\/library.uz.ac.zw\/wp-content\/uploads\/2023\/02\/dgeg-258x300.jpg 258w, https:\/\/library.uz.ac.zw\/wp-content\/uploads\/2023\/02\/dgeg.jpg 299w\" sizes=\"auto, (max-width: 258px) 100vw, 258px\" \/><br \/>\n<\/strong><\/p>\n<p><em>Mechanics of Materials by R. C. Hibbler<\/em><\/p>\n<p><strong>Call Number<\/strong>: TA 405.538 HIB<\/td>\n<td width=\"307\"><em><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-11300\" src=\"http:\/\/10.12.1.49\/wp-content\/uploads\/2023\/02\/gegg-200x300.jpg\" alt=\"\" width=\"200\" height=\"300\" srcset=\"https:\/\/library.uz.ac.zw\/wp-content\/uploads\/2023\/02\/gegg-200x300.jpg 200w, https:\/\/library.uz.ac.zw\/wp-content\/uploads\/2023\/02\/gegg.jpg 299w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/><\/strong><\/em><\/p>\n<p><em>Cloud Computing: Principles and Paradigms by Rajikuma Buyya<\/em><\/p>\n<p><strong>Call Number<\/strong>: QA76.585 CLO<\/td>\n<\/tr>\n<tr>\n<td width=\"309\"><em><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-11301\" src=\"http:\/\/10.12.1.49\/wp-content\/uploads\/2023\/02\/egegeg-232x300.jpg\" alt=\"\" width=\"232\" height=\"300\" srcset=\"https:\/\/library.uz.ac.zw\/wp-content\/uploads\/2023\/02\/egegeg-232x300.jpg 232w, https:\/\/library.uz.ac.zw\/wp-content\/uploads\/2023\/02\/egegeg.jpg 299w\" sizes=\"auto, (max-width: 232px) 100vw, 232px\" \/><\/em><\/p>\n<p><em>Concrete Technology: Theory and Practice by M. S Shetty<\/em><\/p>\n<p><strong>Call Number<\/strong>: TA 439 SHE<\/p>\n<p><strong>\u00a0<\/strong><\/td>\n<td width=\"307\"><em><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-11302\" src=\"http:\/\/10.12.1.49\/wp-content\/uploads\/2023\/02\/dgehbehb.jpg\" alt=\"\" width=\"150\" height=\"214\" \/><\/em><\/p>\n<p><em>Introduction to Computer Theory by Daniel L. A. Cohen<\/em><\/p>\n<p><strong>Call Number<\/strong>: QA 76.32 COH<\/p>\n<p><strong>\u00a0<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"309\"><em><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-11303\" src=\"http:\/\/10.12.1.49\/wp-content\/uploads\/2023\/02\/titit-227x300.jpg\" alt=\"\" width=\"227\" height=\"300\" srcset=\"https:\/\/library.uz.ac.zw\/wp-content\/uploads\/2023\/02\/titit-227x300.jpg 227w, https:\/\/library.uz.ac.zw\/wp-content\/uploads\/2023\/02\/titit.jpg 299w\" sizes=\"auto, (max-width: 227px) 100vw, 227px\" \/><br \/>\n<\/em><\/p>\n<p><em>Operating Systems: Design and Implementation by Andrew S. Tanenbaum<\/em><\/p>\n<p><strong>Call Number<\/strong>: QA76.76 TAN<\/td>\n<td width=\"307\"><em><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-11304\" src=\"http:\/\/10.12.1.49\/wp-content\/uploads\/2023\/02\/tyitotf6o-241x300.jpg\" alt=\"\" width=\"241\" height=\"300\" srcset=\"https:\/\/library.uz.ac.zw\/wp-content\/uploads\/2023\/02\/tyitotf6o-241x300.jpg 241w, https:\/\/library.uz.ac.zw\/wp-content\/uploads\/2023\/02\/tyitotf6o.jpg 299w\" sizes=\"auto, (max-width: 241px) 100vw, 241px\" \/><\/em><\/p>\n<p><em>Interactive Computer graphics: A top down approach with WebGL by Edward Angel and Dave Shreine<\/em><\/p>\n<p><strong>Call Number<\/strong>: T385 ANG<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>Faculty of Computer Engineering, Informatics and Communications electronic resources<\/strong><\/p>\n<p>The UZ website provides access to pertinent e-books and e-journals in the fields of computer engineering, informatics, and communications. When you go to the website (http:\/\/.library.uz.ac.zw), you should click on Campus Access or Off Campus Access if you are not on the university campus or connected to the university internet. You will get access to the university&#8217;s collection of e-books and e-journals. The databases listed below are some of the best for research in computer engineering, informatics, and communications. To begin using any of the databases to access e-books and e-journals, simply click on it.<\/p>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"309\"><strong>E-journal Databases<\/strong><\/td>\n<td width=\"307\"><strong>E-book Databases<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"309\"><strong>\u00a0<\/strong><\/p>\n<p><a href=\"https:\/\/10.12.1.49.uz.remotexs.co\/restricted\/hinari_access.php\"><strong>HINARI<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/10.12.1.49.uz.remotexs.co\/restricted\/hinari_access.php\"><strong>Access To Research for Development and Innovation<\/strong><\/a>(<a href=\"https:\/\/10.12.1.49.uz.remotexs.co\/restricted\/hinari_access.php\"><strong>ARDI<\/strong><\/a><strong>) <\/strong><\/p>\n<p><a href=\"http:\/\/onlinelibrary.wiley.com.uz.remotexs.co\/\"><strong>Wiley Online Library<\/strong><\/a><\/p>\n<p><a href=\"http:\/\/muse.jhu.edu.uz.remotexs.co\/\"><strong>Project Muse<\/strong><\/a><\/p>\n<p><a href=\"http:\/\/www.jstor.org.uz.remotexs.co\/\"><strong>JSTOR<\/strong><\/a><\/p>\n<p><a href=\"http:\/\/www.tandfonline.com.uz.remotexs.co\/\"><strong>Taylor &amp; Francis<\/strong><\/a><\/p>\n<p><a href=\"http:\/\/elibrary.worldbank.org.uz.remotexs.co\/\"><strong>World Bank eLibrary<\/strong><\/a><\/p>\n<p><strong>\u00a0<\/strong><\/td>\n<td width=\"307\"><strong>\u00a0<\/strong><\/p>\n<p><a href=\"http:\/\/onlinelibrary.wiley.com.uz.remotexs.co\/\"><strong>Wiley Online Library<\/strong><\/a><\/p>\n<p><a href=\"http:\/\/muse.jhu.edu.uz.remotexs.co\/\"><strong>Project Muse<\/strong><\/a><\/p>\n<p><a href=\"http:\/\/www.jstor.org.uz.remotexs.co\/\"><strong>JSTOR<\/strong><\/a><\/p>\n<p><a href=\"http:\/\/search.ebscohost.com.uz.remotexs.co\/\"><strong>Ebsco e-Books<\/strong><\/a><\/p>\n<p><a href=\"http:\/\/link.gale.com.uz.remotexs.co\/apps\/menu\/grc?u=uz_itw\"><strong>Gale Research Complete<\/strong><\/a><\/p>\n<table>\n<tbody>\n<tr>\n<td><\/td>\n<td><a href=\"http:\/\/ebookcentral.proquest.com.uz.remotexs.co\/lib\/uzlib-ebooks\/home.action\"><strong>Proquest e-Book Central<\/strong><\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>\u00a0<\/strong><\/p>\n<p>For remote access please click here: <a href=\"https:\/\/uz.remotexs.co\">https:\/\/uz.remotexs.co<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p>[\/vc_column_text][\/vc_tta_section][vc_tta_section title=&#8221;Core Text Books&#8221; tab_id=&#8221;1666876889314-03d2193e-2ebc&#8221;][vc_column_text]<strong>Faculty of Computer Engineering Informatics and Communications Core Textbooks<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-11166\" src=\"http:\/\/10.12.1.49\/wp-content\/uploads\/2022\/11\/wegwerhge.png\" alt=\"\" width=\"126\" height=\"171\" \/><\/td>\n<td><strong><a href=\"http:\/\/uzlibsys.uz.ac.zw\/cgi-bin\/koha\/opac-detail.pl?biblionumber=48969&amp;query_desc=kw%2Cwrdl%3A%20Cloud%20computing\">Cloud computing : concepts, technology, &amp; architecture<\/a> <\/strong><\/p>\n<p>2013<\/p>\n<p>Clouds are distributed technology platforms that leverage sophisticated technology innovations to provide highly scalable and resilient environments that can be remotely utilized by organizations in a multitude of powerful ways. To successfully build upon, integrate with, or even create a cloud environment requires an understanding of its common inner mechanics, architectural layers, and models, as well as an understanding of the business and economic factors that result from the adoption and real-world use of cloud-based services<\/p>\n<p>&nbsp;<\/td>\n<\/tr>\n<tr>\n<td><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-11159\" src=\"http:\/\/10.12.1.49\/wp-content\/uploads\/2022\/11\/fdsfgd-196x300.png\" alt=\"\" width=\"196\" height=\"300\" srcset=\"https:\/\/library.uz.ac.zw\/wp-content\/uploads\/2022\/11\/fdsfgd-196x300.png 196w, https:\/\/library.uz.ac.zw\/wp-content\/uploads\/2022\/11\/fdsfgd.png 216w\" sizes=\"auto, (max-width: 196px) 100vw, 196px\" \/><\/td>\n<td><strong><a href=\"http:\/\/uzlibsys.uz.ac.zw\/cgi-bin\/koha\/opac-detail.pl?biblionumber=48976\">Cloud computing: Principles and Paradigms<\/a>&#8211;<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p>2011<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p>The primary purpose of this book is to capture the state-of-the-art in Cloud Computing technologies and applications. The book will also aim to identify potential research directions and technologies that will facilitate creation a global market-place of cloud computing services supporting scientific, industrial, business, and consumer applications. We expect the book to serve as a reference for larger audience such as systems architects, practitioners, developers, new researchers and graduate level students. This area of research is relatively recent, and as such has no existing reference book that addresses it.<\/p>\n<p><strong>\u00a0<\/strong><\/td>\n<\/tr>\n<tr>\n<td><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-11161\" src=\"http:\/\/10.12.1.49\/wp-content\/uploads\/2022\/11\/sgwrhehet.png\" alt=\"\" width=\"178\" height=\"221\" \/><\/td>\n<td><strong><a href=\"http:\/\/uzlibsys.uz.ac.zw\/cgi-bin\/koha\/opac-detail.pl?biblionumber=49147&amp;query_desc=kw%2Cwrdl%3A%20Computer%20Organisation%20and%20Design\">Computer Organisation and Design<\/a><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>2006<\/p>\n<p>&nbsp;<\/p>\n<p>Computer Organization and Design: The Hardware\/Software Interface, Sixth Edition, the leading, award-winning textbook from Patterson and Hennessy used by more than 40,000 students per year, continues to present the most comprehensive and readable introduction to this core computer science topic. Improvements to this new release include new sections in each chapter on Domain Specific Architectures (DSA) and updates on all real-world examples that keep it fresh and relevant for a new generation of students.<\/p>\n<p>&nbsp;<\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td><strong><a href=\"http:\/\/uzlibsys.uz.ac.zw\/cgi-bin\/koha\/opac-detail.pl?biblionumber=49172\">Data Mining: Practical Machine Learning Tools and Techniques<\/a> <\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>2011<\/p>\n<p>&nbsp;<\/p>\n<p>Data Mining: Practical Machine Learning Tools and Techniques, Fourth Edition, offers a thorough grounding in machine learning concepts, along with practical advice on applying these tools and techniques in real-world data mining situations. This highly anticipated fourth edition of the most acclaimed work on data mining and machine learning teaches readers everything they need to know to get going, from preparing inputs, interpreting outputs, evaluating results, to the algorithmic methods at the heart of successful data mining approaches.<\/p>\n<p>&nbsp;<\/td>\n<\/tr>\n<tr>\n<td><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-11163\" src=\"http:\/\/10.12.1.49\/wp-content\/uploads\/2022\/11\/gnrtjrjet.png\" alt=\"\" width=\"182\" height=\"220\" \/><\/td>\n<td><strong><a href=\"http:\/\/uzlibsys.uz.ac.zw\/cgi-bin\/koha\/opac-detail.pl?biblionumber=49196&amp;query_desc=kw%2Cwrdl%3A%20Fundamentals%20of%20Database%20Systems\">Fundamentals of Database Systems<\/a> <\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>2014<\/p>\n<p>&nbsp;<\/p>\n<p>This book introduces the fundamental concepts necessary for designing, using, and implementing database systems and database applications. Our presentation stresses the fundamentals of database modeling and design, the languages and models provided by the database management systems, and database system implementation techniques. The book is meant to be used as a textbook for a one- or two-semester course in database systems at the junior, senior, or graduate level, and as a reference book<\/p>\n<p>&nbsp;<\/td>\n<\/tr>\n<tr>\n<td><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-10778\" src=\"http:\/\/10.12.1.49\/wp-content\/uploads\/2022\/10\/5555-1-235x300.png\" alt=\"\" width=\"235\" height=\"300\" srcset=\"https:\/\/library.uz.ac.zw\/wp-content\/uploads\/2022\/10\/5555-1-235x300.png 235w, https:\/\/library.uz.ac.zw\/wp-content\/uploads\/2022\/10\/5555-1.png 308w\" sizes=\"auto, (max-width: 235px) 100vw, 235px\" \/><\/td>\n<td><a href=\"http:\/\/uzlibsys.uz.ac.zw\/cgi-bin\/koha\/opac-detail.pl?biblionumber=76055&amp;query_desc=kw%2Cwrdl%3A%20Cloud%20computing\"><strong>Guide to computer network security<\/strong><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>2017<\/p>\n<p>&nbsp;<\/p>\n<p>This definitive text\/reference on computer network and information security presents a comprehensive guide to the repertoire of security tools, algorithms and best practices mandated by the rapidly evolving ubiquitous technology we are increasingly dependent on. Fully revised and updated, this timely new edition encompasses the latest developments in system resource virtualization, cloud computing models, and mobile computing technology, including a new chapter on the Internet of Things.<\/p>\n<p>&nbsp;<\/td>\n<\/tr>\n<tr>\n<td><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-10773\" src=\"http:\/\/10.12.1.49\/wp-content\/uploads\/2022\/10\/2222.png\" alt=\"\" width=\"128\" height=\"197\" \/><\/td>\n<td><strong><a href=\"http:\/\/uzlibsys.uz.ac.zw\/cgi-bin\/koha\/opac-detail.pl?biblionumber=76055&amp;query_desc=kw%2Cwrdl%3A%20computer%20networks\">Guide to Computer Network security<\/a><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>2017<\/p>\n<p>&nbsp;<\/p>\n<p>This timely textbook presents a comprehensive guide to the core topics in cybersecurity, covering issues of security that extend beyond traditional computer networks to the ubiquitous mobile communications and online social networks that have become part of our daily lives. In the context of our growing dependence on an ever-changing digital ecosystem, this book stresses the importance of security awareness, whether in our homes, our businesses, or our public spaces. This fully updated new edition features new material on the security issues raised by blockchain technology, and its use in logistics, digital ledgers, payments systems, and digital contracts.<\/p>\n<p>&nbsp;<\/td>\n<\/tr>\n<tr>\n<td><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-10783\" src=\"http:\/\/10.12.1.49\/wp-content\/uploads\/2022\/10\/99999-199x300.png\" alt=\"\" width=\"199\" height=\"300\" srcset=\"https:\/\/library.uz.ac.zw\/wp-content\/uploads\/2022\/10\/99999-199x300.png 199w, https:\/\/library.uz.ac.zw\/wp-content\/uploads\/2022\/10\/99999.png 221w\" sizes=\"auto, (max-width: 199px) 100vw, 199px\" \/><\/td>\n<td><strong><a href=\"http:\/\/uzlibsys.uz.ac.zw\/cgi-bin\/koha\/opac-detail.pl?biblionumber=47648&amp;query_desc=kw%2Cwrdl%3A%20computer%20systems\">Intelligence and Security Informatics: Techniques and Applications<\/a> <\/strong><\/p>\n<p>2008<\/p>\n<p>This book, <em>INTELLIGENCE and SECURITY INFORMATICS: TECHNIQUES &amp; APPLICATIONS,<\/em> presents a collection of works discussing terrorism informatics, information sharing, data mining, intelligence and crime analysis, infrastructure protection, privacy protection, information surveillance, and emergency response. The authors come from nine different countries and contribute a total of twenty-two chapters of advanced and high-impact ISI research<\/td>\n<\/tr>\n<tr>\n<td><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-10784\" src=\"http:\/\/10.12.1.49\/wp-content\/uploads\/2022\/10\/hdf.png\" alt=\"\" width=\"124\" height=\"185\" \/><\/td>\n<td><strong><a href=\"http:\/\/uzlibsys.uz.ac.zw\/cgi-bin\/koha\/opac-detail.pl?biblionumber=88524\">Rethinking IT in Construction and Engineering<\/a> <\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>2007<\/p>\n<p>&nbsp;<\/p>\n<p>Based on the author&#8217;s twenty years research experience, this book provides a holistic picture of the factors that enable architecture, construction and engineering organisations to explore the potential of IT to improve their businesses and achieve a sustainable competitive advantage.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/td>\n<\/tr>\n<tr>\n<td><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-10774\" src=\"http:\/\/10.12.1.49\/wp-content\/uploads\/2022\/10\/333.png\" alt=\"\" width=\"218\" height=\"269\" \/><\/td>\n<td><strong><a href=\"http:\/\/uzlibsys.uz.ac.zw\/cgi-bin\/koha\/opac-detail.pl?biblionumber=49136&amp;query_desc=kw%2Cwrdl%3A%20Software%20Engineering\">Software Engineering<\/a> <\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p>2015<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p>Software Engineering introduces readers to the overwhelmingly important subject of software programming and development. In the past few years, computer systems have come to dominate not just our technological growth, but the foundations of our world\u2019s major industries. This text seeks to lay out the fundamental concepts of this huge and continually growing subject area in a clear and comprehensive manner.<\/p>\n<p>&nbsp;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/vc_column_text][\/vc_tta_section][\/vc_tta_tabs][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_tta_tabs][vc_tta_section title=&#8221;Faculty Home&#8221; tab_id=&#8221;1648807185121-b8c6e6cd-b0eb&#8221;][vc_column_text] Ms. Precious Mwatsiya Subject Information Specialist \u2013 Faculty of Computer Engineering, informatics and Communications pmwatsiya@uzlib.uz.ac.zw Introduction &nbsp; Welcome to the University of Zimbabwe Library Faculty of Computer Engineering, informatics and Communications Liaison Section. The Liaison page &hellip; <\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"class_list":["post-9214","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/library.uz.ac.zw\/index.php\/wp-json\/wp\/v2\/pages\/9214","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/library.uz.ac.zw\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/library.uz.ac.zw\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/library.uz.ac.zw\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/library.uz.ac.zw\/index.php\/wp-json\/wp\/v2\/comments?post=9214"}],"version-history":[{"count":15,"href":"https:\/\/library.uz.ac.zw\/index.php\/wp-json\/wp\/v2\/pages\/9214\/revisions"}],"predecessor-version":[{"id":11893,"href":"https:\/\/library.uz.ac.zw\/index.php\/wp-json\/wp\/v2\/pages\/9214\/revisions\/11893"}],"wp:attachment":[{"href":"https:\/\/library.uz.ac.zw\/index.php\/wp-json\/wp\/v2\/media?parent=9214"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}