You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Management relatively, is not a new subject. However , it has acquired a great significance over the last decade or so. Now, managers are not merely the people, engeged in business, instead, they are leaders in their areas, who not only lead their work fo
This book constitutes the refereed proceedings of the First International Conference on Advances in Parallel, Distributed Computing Technologies and Applications, PDCTA 2011, held in Tirunelveli, India, in September 2011. The 64 revised full papers were carefully reviewed and selected from over 400 submissions. Providing an excellent international forum for sharing knowledge and results in theory, methodology and applications of parallel, distributed computing the papers address all current issues in this field with special focus on algorithms and applications, computer networks, cyber trust and security, wireless networks, as well as mobile computing and bioinformatics.
This two-volume set (CCIS 1240-1241) constitutes the refereed proceedings of the Second International Conference on Machine Learning, Image Processing, Network Security and Data Sciences, MIND 2020, held in Silchar, India. Due to the COVID-19 pandemic the conference has been postponed to July 2020. The 79 full papers and 4 short papers were thoroughly reviewed and selected from 219 submissions. The papers are organized according to the following topical sections: data science and big data; image processing and computer vision; machine learning and computational intelligence; network and cyber security.
Wireless Sensor Network (WSN) consists of numerous physically distributed autonomous devices used for sensing and monitoring the physical and/or environmental conditions. A WSN uses a gateway that provides wireless connectivity to the wired world as well as distributed networks. There are many open problems related to Ad-Hoc networks and its applications. Looking at the expansion of the cellular infrastructure, Ad-Hoc network may be acting as the basis of the 4th generation wireless technology with the new paradigm of ‘anytime, anywhere communications’. To realize this, the real challenge would be the security, authorization and management issues of the large scale WSNs. This book is an ...
Williams Textbook of Endocrinology, 14 Edition: South Asia Edition, 2 Vol SET - E-Book
Ali Amjad was once a recognized name in India’s labor movement. Because of his deep involvement with India’s freedom movement and workers’ rights movement, he was often incarcerated for long periods of time. After migrating to Pakistan, he formally chose the field of labor law for the defense of workers’ rights as a senior lawyer of Pakistan’s supreme court. His Urdu novel Kali Mati (‘Black Soil’) is based on the historic labor strike of 1958 at the Tata Steel plant in Jamshedpur, and is partly autobiographical, as detailed in his Urdu memoir Shakh-e-Nehal-e-Gham (‘A Branch of the Sapling of Sorrow’). The novel also quite brilliantly unpacks the conspiratorial plot leading to the communal violence of Jamshedpur in 1964.
Cyberfeminism and Gender Violence in Social Media is a timely and essential book that addresses the increasing violence against women on social media platforms. With the rise of digitalization and the advent of social media, women have been subjected to various forms of violence such as cyberbullying, trolling, and body shaming. This volume compiles research works on the topic of how women fall prey to social networking sites and possible remedial actions to prevent such issues. The book provides an interdisciplinary approach, making it relevant to a wide range of fields such as social science, humanities, technology, and management. It creates awareness among people, especially women, about...
This book constitutes revised selected papers from the International Conference on Advanced Computing, Networking and Security, ADCONS 2011, held in Surathkal, India, in December 2011. The 73 papers included in this book were carefully reviewed and selected from 289 submissions. The papers are organized in topical sections on distributed computing, image processing, pattern recognition, applied algorithms, wireless networking, sensor networks, network infrastructure, cryptography, Web security, and application security.
In the computer science industry, high levels of performance remain the focal point in software engineering. This quest has made current systems exceedingly complex, as practitioners strive to discover novel approaches to increase the capabilities of modern computer structures. A prevalent area of research in recent years is scalable transaction processing and its usage in large databases and cloud computing. Despite its popularity, there remains a need for significant research in the understanding of scalability and its performance within distributed databases. Handling Priority Inversion in Time-Constrained Distributed Databases provides emerging research exploring the theoretical and practical aspects of database transaction processing frameworks and improving their performance using modern technologies and algorithms. Featuring coverage on a broad range of topics such as consistency mechanisms, real-time systems, and replica management, this book is ideally designed for IT professionals, computing specialists, developers, researchers, data engineers, executives, academics, and students seeking research on current trends and developments in distributed computing and databases.