You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Drawing inspiration from the ancient wisdom of storytelling, "Cyber Safety Chronicles (For Parents, Teachers, Teenagers, and Young Adults)" is a modern-day counterpart crafted to address the challenges of the digital age. This collection of 32 riveting case studies, set in the dynamic landscape of India, is an invaluable resource for parents, teens, young adults, and school teachers. It delves into the complexities of the online world, from social media's perils to cyber law's intricacies, making it a crucial tool for understanding and navigating the digital era. Each story is a carefully woven narrative, blending technology, ethics, and legal principles, reflecting real-life scenarios relev...
What is life if not for its lessons? Every little nook we visit, every coexisting soul we meet, every brick in history we touch adds a new dimension to us in the form of inseparable learnings. Even the most minuscule of the lessons remain etched deep into our being. This book is an anthology of similar little learnings from the life of the author that do not fail to leave an impact on our lives whether personal or professional. This book, through its insightful take on small independent events, helps the reader draw wisdom from them. So, if you have a knack for seeing your daily life in a way that it adds to your professional success, if you have the curiosity to meet people who add a new dimension to your personality, and if you still have a childlike inquisitiveness within you to experience real influence from little lessons of life, then this book is for you.
The impact of cutting parameters in the confronting procedure for the most part influences the Tool life and Production time of item. The developing rivalry for higher profitability with great surface finish has made the need of utilizing top notch machining instrument. The significant cutting parameters in confronting process chiefly cutting speed, feed rate, depth of cut influence the Tool life and Production time of the completed material. This paper reviews the streamlining of cutting parameters in confronting process utilizing Taguchi method. An exceptionally structured symmetrical exhibit of Taguchi is utilized to examine the impact of slicing parameters through the modest number of an...
This book provides a wide-ranging overview of artificial intelligence (AI), machine learning (ML) and deep learning (DL) algorithms in ophthalmology. Expertly written chapters examine AI in age-related macular degeneration, glaucoma, retinopathy of prematurity and diabetic retinopathy screening. AI perspectives, systems and limitations are all carefully assessed throughout the book as well as the technical aspects of DL systems for retinal diseases including the application of Google DeepMind, the Singapore algorithm, and the Johns Hopkins algorithm. Artificial Intelligence in Ophthalmology meets the need for a resource that reviews the benefits and pitfalls of AI, ML and DL in ophthalmology. Ophthalmologists, optometrists, eye-care workers, neurologists, cardiologists, internal medicine specialists, AI engineers and IT specialists with an interest in how AI can help with early diagnosis and monitoring treatment in ophthalmic patients will find this book to be an indispensable guide to an evolving area of healthcare technology.
Necessity entrepreneurs are individuals in developing countries who start small enterprises out of necessity. While they range from street sellers to educated hopefuls with little access to formal employment, the one thing that unites them is the need
Contextualizing Humanitarian work in history, justice, methods and professional ethics, this book articulates process skills for transformational partnerships between diverse organizations, motivating education, organisational learning and selecting the disaster workforce.
The two volumes set, CCIS 383 and 384, constitutes the refereed proceedings of the 14th International Conference on Engineering Applications of Neural Networks, EANN 2013, held on Halkidiki, Greece, in September 2013. The 91 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers describe the applications of artificial neural networks and other soft computing approaches to various fields such as pattern recognition-predictors, soft computing applications, medical applications of AI, fuzzy inference, evolutionary algorithms, classification, learning and data mining, control techniques-aspects of AI evolution, image and video analysis, classification, pattern recognition, social media and community based governance, medical applications of AI-bioinformatics and learning.
This book examines the Indian mandate for Corporate Social Responsibility (CSR) and its implementations in various individual organizations. Although the mandate is applicable only to certain large and stable companies, many believe that India is poised to become the birthplace of social, economic and environmental transformation, given the immense size of the Indian population and its challenging socio-economic index. The book explores the various facets of CSR investigation and places special emphasis on the Schedule VII of the Indian Companies Act of 2013, which defines specific areas of intervention for these companies. In addition, it provides a wealth of first-hand case studies that exemplify the ongoing developments and the fundamental challenges and opportunities of mandated CSR.
This book reports on the latest advances on the theories, practices, standards and strategies that are related to the modern technology paradigms, the Mobile Cloud computing (MCC) and Big Data, as the pillars and their association with the emerging 5G mobile networks. The book includes 15 rigorously refereed chapters written by leading international researchers, providing the readers with technical and scientific information about various aspects of Big Data and Mobile Cloud Computing, from basic concepts to advanced findings, reporting the state-of-the-art on Big Data management. It demonstrates and discusses methods and practices to improve multi-source Big Data manipulation techniques, as well as the integration of resources availability through the 3As (Anywhere, Anything, Anytime) paradigm, using the 5G access technologies.
The book constitutes a unique combination of in-depth insights into the counterfeit market, best-practice strategies, novel management tools, and product protection technologies. It provides both the insights required to develop effective brand and product protection strategies, and the insights that are required to effectively respond to counterfeit trade. Key benefits are the unbiased analysis of the counterfeit market, the strong focus on assisting practitioners to deal with the challenge, and the high standard of research that supports the presented findings.