Search Results - Madha*
Suggested Topics within your search.
Suggested Topics within your search.
- Economics 2
- Chinese diaspora 1
- Communication 1
- Computational intelligence 1
- Computer 1
- Computer security 1
- Data protection 1
- Dhimmis 1
- East Indian diaspora 1
- Elections 1
- Engineering design 1
- Ethnic relations 1
- Foreign relations 1
- Human geography 1
- Ikhtilaf (Islamic law) 1
- Integrated circuits 1
- Islamic law 1
- Jihad 1
- Microelectronic packaging 1
- Minorities (Islamic law) 1
- Multichip modules (microelectronics) 1
- Network systems 1
- Political culture 1
- Satellite 1
- Social aspects 1
- UNIX (Computer operating system) 1
- Very large scale intergration 1
- War 1
- aided design 1
- design and construction 1
-
1
-
2
-
3
-
4
-
5
-
6
The Sarva-Darsana-Samgraha Review of the Different Systems of Hindu Philosophy
Published 2010Get full text
Rights
Electronic eBook -
7
-
8
Tales from the Hindu Dramatists
Published 2006“…Sakuntala or the lost ring -- Vikramorvasi or Urvasi won by valour -- Malavikagnimitra -- The vira charita or the mahavira charita -- Uttar Rama Charita -- Malati and Madhava or the stolen marriage -- Hanuman Nataka, or Mahanataka, or the great…”
Get full text
Rights
Electronic eBook -
9
Disagreements of the jurists a manual of Islamic legal theory
Published 2015“…Ikhtilaf usul al-madhahib.…”
Book -
10
Indian and Chinese immigrant communities : comparative perspectives / edited by Jayati Bhattacharya and Coonoor Kripalani.
Published 2015Table of Contents: “…Hindu spaces in the Chinatowns of Kolkata and Singapore / Jayani Bonnerjee -- Indians in China and Chinese in India -- Law and its impact on diasporic philanthropic institutions: -- The practices of Sinchew and the Waqf in the Straits settlements / Stephanie Chung Po-Yin -- Indian soldiers and policemen in China in the colonial period / Madhavi Thampi -- New Indian migrants in Guangzhou and its vicinity / Jia Haitao -- Across the globe: Indian and Chinese diasporas -- Who is a Chinese-Indian? …”
Book -
11
Improving information security practices through computational intelligence
Published 2016Table of Contents: “…El-Alfy, King Fahd University of Petroleum and Minerals, KSA -- Intelligent intrusion detection -- The conceptual and architectural design of an intelligent intrusion detection system / Mradul Dhakar, ITM University Gwalior, India, Akhilesh Tiwari, Madhav Institute of Technology and Science, India -- Agents for intrusion detection in manet : a survey and analysis / Leila Mechtri, Badji Mokhtar University, Annaba, Fatiha Djemili Tolba, Badji Mokhtar University, Annaba, Salim Ghanemi, Badji Mokhtar University, Annaba -- Authentication -- Applications of digital signature certificates for online information security / Mohammad Tariq Banday, University Of Kashmir, India -- Cryptomodules in wireless networks using biometric authentication : securing nodes in wireless networks / Martin Drahanský, Brno University Of Technology, Czech Republic, Petr Hanáek, Brno University Of Technology, Czech Republic, Franticek Zbolil, Brno University Of Technology, Czech Republic, Martin Henzl, Brno University Of Technology, Czech Republic, Franticek V. …”
Book -
12
The legacy of Jihad Islamic holy war and the fate of non-Muslims
Published 2005Table of Contents: “…Kitab al-Wagiz fi fiqh madhab al-imam al-Saf'i / Al-Ghazali. [Untitled] / Sirhindi. …”
Book -
13
Elections as popular culture in Asia
Published 2007Table of Contents: “…. -- Middle class electoral cultural practices in Thailand / Pitch Pongsawat -- Election with known outcome : engaging the 2004 Malaysian election / Francis Loh Kok Wah -- Fun with democracy : election coverage and the elusive subject of Indian politics / Madhava Prasad -- Net power and politics in Korea / Keehyeung Lee -- Depersonalization is politically correct : Japanese electioneering practices / Kaori Tsurumoto.…”
Book


