You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book introduces a new set of orthogonal hybrid functions (HF) which approximates time functions in a piecewise linear manner which is very suitable for practical applications. The book presents an analysis of different systems namely, time-invariant system, time-varying system, multi-delay systems---both homogeneous and non-homogeneous type- and the solutions are obtained in the form of discrete samples. The book also investigates system identification problems for many of the above systems. The book is spread over 15 chapters and contains 180 black and white figures, 18 colour figures, 85 tables and 56 illustrative examples. MATLAB codes for many such examples are included at the end of the book.
Food security emerged as an issue in the first decade of the 21st Century, questioning the sustainability of the human race, which is inevitably related directly to the agricultural water management that has multifaceted dimensions and requires interdisciplinary expertise in order to be dealt with. The purpose of this book is to bring together and integrate the subject matter that deals with the equity, profitability and irrigation water pricing; modelling, monitoring and assessment techniques; sustainable irrigation development and management, and strategies for irrigation water supply and conservation in a single text. The book is divided into four sections and is intended to be a comprehensive reference for students, professionals and researchers working on various aspects of agricultural water management. The book seeks its impact from the diverse nature of content revealing situations from different continents (Australia, USA, Asia, Europe and Africa). Various case studies have been discussed in the chapters to present a general scenario of the problem, perspective and challenges of irrigation water use.
The book covers a wide range of topics in Computer Science and Information Technology including swarm intelligence, artificial intelligence, evolutionary algorithms, and bio-inspired algorithms. It is a collection of papers presented at the First International Conference on Intelligent Computing and Communication (ICIC2) 2016. The prime areas of the conference are Intelligent Computing, Intelligent Communication, Bio-informatics, Geo-informatics, Algorithm, Graphics and Image Processing, Graph Labeling, Web Security, Privacy and e-Commerce, Computational Geometry, Service Orient Architecture, and Data Engineering.
A Soul-Teaser taking you to ‘depths’ you might not have plumbed yet! A workbook that helps you take stock of your abilities and work on them further, for soaring with a ‘clear vision’ of your strengths & opportunities ahead! An engaging, handy ‘introspection tool’ for reaching out effectively; building societal and familial bonds of harmony & empathy; for peace to ‘reign supreme!’ Helps you surf the seas of your own thoughts, triggers and the “100 Qs & prompts” here, illuminating your path of self-guidance!
The solvent-free approach provides green and alternative synthetic methods for obtaining diverse bioactive heterocycles. The solvent is frequently the primary component of synthetic protocol and contributes to significant waste. Additionally, its removal processes are energy intensive and substantial. This book explores different solvent-free procedures for efficiently synthesising heterocyclic analogues of immense biological importance and other applications.
This book offers practical as well as conceptual knowledge of the latest trends, tools, techniques and methodologies of data analytics in smart cities. The smart city is an advanced technological area that is capable of understanding the environment by examining the data to improve the livability. The smart cities allow different kinds of wireless sensors to gather massive amounts, full speed and a broad range of city data. The smart city has a focus on data analytics facilitated through the IoT platforms. There is a need to customize the IoT architecture and infrastructures to address needs in application of specific domains of smart cities such as transportation, traffic, health and, envir...
The two volume set CCIS 775 and 776 constitutes the refereed proceedings of the First International Conference on Computational Intelligence, Communications, and Business Analytics, CICBA 2017, held in Kolkata, India, in March 2017. The 90 revised full papers presented in the two volumes were carefully reviewed and selected from 276 submissions. The papers are organized in topical sections on data science and advanced data analytics; signal processing and communications; microelectronics, sensors, intelligent networks; computational forensics (privacy and security); computational intelligence in bio-computing; computational intelligence in mobile and quantum computing; intelligent data mining and data warehousing; computational intelligence.
Steganography is the art of secret writing. The purpose of steganography is to hide the presence of a message from the intruder by using state-of-the-art methods, algorithms, architectures, models, and methodologies in the domains of cloud, internet of things (IoT), and the Android platform. Though security controls in cloud computing, IoT, and Android platforms are not much different than security controls in an IT environment, they might still present different types of risks to an organization than the classic IT solutions. Therefore, a detailed discussion is needed in case there is a breach in security. It is important to review the security aspects of cloud, IoT, and Android platforms r...
This edited book provides an optimal portrayal of the principles and applications related to network security. The book is thematically divided into five segments: Part A describes the introductory issues related to network security with some concepts of cutting-edge technologies; Part B builds from there and exposes the readers to the digital, cloud and IoT forensics; Part C presents readers with blockchain and cryptography techniques; Part D deals with the role of AI and machine learning in the context of network security. And lastly, Part E is written on different security networking methodologies. This is a great book on network security, which has lucid and well-planned chapters. All th...
The two volume set CCIS 1030 and 1031 constitutes the refereed proceedings of the Second International Conference on Computational Intelligence, Communications, and Business Analytics, CICBA 2018, held in Kalyani, India, in July 2018. The 76 revised full papers presented in the two volumes were carefully reviewed and selected from 240 submissions. The papers are organized in topical sections on computational intelligence; signal processing and communications; microelectronics, sensors, and intelligent networks; data science & advanced data analytics; intelligent data mining & data warehousing; and computational forensics (privacy and security).