You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Explores the cultural significance of the metrosexual in sports.
Treta Yug- Raavan was very proud of himself that, no man on this earth, could defeat him, so even after knowing all this, he did not returned Sita Ji, but he got engaged in a task, that if he really died, then, he should sustain on this earth in one or another way. Dvapar Yug- Battlefield of Kurukshetr, Late evening, 18th day of war. Bheem smashed Duryodhan’s both thighs in the Mace dual. Duryodhan was lying on the ground, his both thigh’s femur bones ruptured and dislocated from pelvis. Ashwathama came and promised Duryodhana, that he will take back Hastinapur Kaliyug- Every Kaithi villager was watching same news, on TV and Mobile on Purali for last one day. The news was devastating, no...
• A spinning wheel which paved way for a nation’s independence from foreign rule and became its symbol for self – sufficiency and dignity. • The world’s only floating post office. • The world’s tallest statue in memory of the legendary “Iron Man” who united more than 500 princely states and thus became the architect of the world’s largest democracy. • Magnificent and mystic festivals of kites, lights, boats and colours with elaborate rituals. • A crater on Planet Venus named after a lady doctor. • The son of a boatman who sold flowers outside a temple but grew up to become the nation’s “Missile Man” and also its President. • “Tandav / ?????”, the Cosmic ...
Personal data is increasingly important in our lives. We use personal data to quantify our behaviour, through health apps or for 'personal branding' and we are also increasingly forced to part with our data to access services. With the proliferation of embedded sensors, the built environment is playing a key role in this developing use of data, even though this remains relatively hidden. Buildings are sites for the capture of personal data. This data is used to adapt buildings to people's behaviour, and increasingly, organisations use this data to understand how buildings are occupied and how communities develop within them. A whole host of technical, practical, social and ethical challenges...
The book discusses the impact of machine learning and computational intelligent algorithms on medical image data processing, and introduces the latest trends in machine learning technologies and computational intelligence for intelligent medical image analysis. The topics covered include automated region of interest detection of magnetic resonance images based on center of gravity; brain tumor detection through low-level features detection; automatic MRI image segmentation for brain tumor detection using the multi-level sigmoid activation function; and computer-aided detection of mammographic lesions using convolutional neural networks.
None
The Internet of Things (IoT) is a widely distributed and networked system of interrelated and interacting computing devices and objects. Because of IoT’s broad scope, it presents unique security problems, ranging from unsecure devices to users vulnerable to hackers. Presenting cutting- edge research to meet these challenges, Internet of Things Vulnerabilities and Recovery Strategies presents models of attack on IoT systems and solutions to prevent such attacks. Examining the requirements to secure IoT- systems, the book offers recovery strategies and addresses security concerns related to: Data Routing Data Integrity Device Supervision IoT Integration Information Storage IoT Performance The book takes a holistic approach that encompasses visibility, segmentation, and protection. In addition to visual approaches and policy- driven measures, the book looks at developing secure and fault- tolerant IoT devices. It examines how to locate faults and presents mitigation strategies, as well as security models to prevent and thwart hacking. The book also examines security issues related to IoT systems and device maintenance.
In today's rapidly advancing digital world, governments face the dual challenge of harnessing technology to enhance security systems while safeguarding sensitive data from cyber threats and privacy breaches. Futuristic e-Governance Security With Deep Learning Applications provides a timely and indispensable solution to these pressing concerns. This comprehensive book takes a global perspective, exploring the integration of intelligent systems with cybersecurity applications to protect deep learning models and ensure the secure functioning of e-governance systems. By delving into cutting-edge techniques and methodologies, this book equips scholars, researchers, and industry experts with the k...
This book contains revised selected papers presented at 4 workshops held at the 16th IFIP TC 13 International Conference on Human-Computer Interaction, INTERACT 2017, in Mumbai, India, in September 2017. The workshops are: Workshop on Dealing with Conflicting User Interface Properties in User-Centered Development Processes (IFIP WG 13.2 and 13.5), Workshop on Cross Cultural Differences in Designing for Accessibility and Universal Design Organizers (IFIP WG 13.3), Human Work Interaction Design Meets International Development (IFIP WG 13.6), and Beyond Computers: Wearables, Humans, and Things - WHAT! (IFIP WG 13.7). The 15 full papers included in this volume were carefully reviewed and selected from numerous submissions. They show advances in the field of HCI dealing with topics such as human-centered computing, user interface design, evolutionary user interface prototyping, end-user development systems, accessibility design, human work interaction design, and wearables.
The book bridges the gap between pharmaceutics and molecular modelling at the micro, meso and macro scale. It covers Lipinski's rule of five, nanoparticulate drug delivery, computational prediction of drug solubility and ability to cross blood brain barrier, computer-based simulation of pharmacokinetic parameters, virtual screening of mucoadhesive polymers, QSPR modelling, designing of 2D nanomaterials and role of principal component analysis.