You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book captures some real-life scenarios where people bound by circumstances terminate their journey halfway. Being tired of failures, all their talents and aspirations get buried in the sands of time. Accepting it to be destiny’s cruel decision, they move from door to door with a begging bowl, desperately in search of a faint ray of hope: ‘Will the fortune ever smile on us?’ Some terrorists and trouble makers train and engage innocent boys in unlawful activities. The high sounding speech of the self-claimed servants of the people, on different occasions like Independence Day, Children’s Day, Martyrs’ Day, .. end up with some promises and assurances - far from reality. Dada Jiâ€...
Books in this series have been specially designed to meet the requirements of a large spectrum of engineering students of WBUT-those who find learning the concepts difficult and want to study through solved examples and those who wish to study in the traditional way. Modern-day engineers constantly encounter applications of thermodynamics and fluid mechanics while working with engineering designs and structures, converting the power of heat and fluid into mechanical work-from early steam engines to hydroelectricity and supersonic jets. Equipping budding engineers with state-of-the-art technology, Engineering Thermodynamics and Fluid Mechanics provides an in-depth study of the two disciplines.Key Features1. Summary at the end of each chapter for quick recapitulation2. Large number of MCQs, review questions and numerical problem sets for self-assessment3. Five model test papers for practice4. Solution to past ten years' university papers
This reference text presents the important components for grasping the potential of social computing with an emphasis on concerns, challenges, and benefits of the social platform in depth. Features: Detailed discussion on social-cyber issues, including hate speech, cyberbullying, and others Discusses usefulness of social platforms for societal needs Includes framework to address the social issues with their implementations Covers fake news and rumor detection models Describes sentimental analysis of social posts with advanced learning techniques The book is ideal for undergraduate, postgraduate, and research students who want to learn about the issues, challenges, and solutions of social platforms in depth.
The book is a compilation of high-quality scientific papers presented at the 3rd International Conference on Computer & Communication Technologies (IC3T 2016). The individual papers address cutting-edge technologies and applications of soft computing, artificial intelligence and communication. In addition, a variety of further topics are discussed, which include data mining, machine intelligence, fuzzy computing, sensor networks, signal and image processing, human-computer interaction, web intelligence, etc. As such, it offers readers a valuable and unique resource.
None
With the increasing power of computing, cybersecurity faces mounting threats, making digital systems more vulnerable to attacks. While modern cryptography used to be compelling, it now shows vulnerabilities against rapidly growing computational capabilities. Therefore, robust security solutions have become urgent in this precarious landscape. Advancing Cyber Security Through Quantum Cryptography is a book that can guide us through the turbulent waters of cybersecurity and quantum cryptography. It offers a panoramic view of current affairs, insightful analyses, illuminating case studies, and meticulous exploration of challenges and opportunities. Through this book, readers can gain knowledge and navigate this complex terrain. It delves into critical areas where quantum cryptography can fortify cybersecurity defenses, such as secure communications, e-commerce, and quantum internet.
This contributed volume describes management practices based on interdisciplinary and convergence science approaches from different disciplines of agricultural science to enhance the resilience of dryland agriculture. The main focus of this book is to address the current issues and trends along with future prospects and challenges in adopting salient agricultural management practices in drylands globally under a climate-change scenario. Climate change and global warming have profound repercussions on increasing frequency, severity, and duration of droughts and/or floods, which may have implications for future productivity of dryland agriculture, e.g., more water shortages or abundances and h...
The book presents the proceedings of the 10th International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA 2022), held at NIT Mizoram, Aizawl, Mizoram, India during 18 – 19 June 2022. Researchers, scientists, engineers, and practitioners exchange new ideas and experiences in the domain of intelligent computing theories with prospective applications in various engineering disciplines in the book. These proceedings are divided into two volumes. It covers broad areas of information and decision sciences, with papers exploring both the theoretical and practical aspects of data-intensive computing, data mining, evolutionary computation, knowledge management and networks, sensor networks, signal processing, wireless networks, protocols and architectures. This volume is a valuable resource for postgraduate students in various engineering disciplines.
Collecting and processing data is a necessary aspect of living in a technologically advanced society. Whether it’s monitoring events, controlling different variables, or using decision-making applications, it is important to have a system that is both inexpensive and capable of coping with high amounts of data. As the application of these networks becomes more common, it becomes imperative to evaluate their effectiveness as well as other opportunities for possible implementation in the future. Sensor Technology: Concepts, Methodologies, Tools, and Applications is a vital reference source that brings together new ways to process and monitor data and to put it to work in everything from intelligent transportation systems to healthcare to multimedia applications. It also provides inclusive coverage on the processing and applications of wireless communication, sensor networks, and mobile computing. Highlighting a range of topics such as internet of things, signal processing hardware, and wireless sensor technologies, this multi-volume book is ideally designed for research and development engineers, IT specialists, developers, graduate students, academics, and researchers.
This book discusses the implications of new technologies for a secured society. As such, it reflects the main focus of the International Conference on Ethical Hacking, eHaCon 2018, which is essentially in evaluating the security of computer systems using penetration testing techniques. Showcasing the most outstanding research papers presented at the conference, the book shares new findings on computer network attacks and defenses, commercial security solutions, and hands-on, real-world security experience. The respective sections include network security, ethical hacking, cryptography, digital forensics, cloud security, information security, mobile communications security, and cyber security.