You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Neurodegeneration is characterized by the progressive loss of neural tissue that result in various neurodegeneration-initiated cerebral failures and complex diseases such as Alzheimer’s disease, Parkinson’s disease, Huntington’s disease. All these medical conditions are accompanied by the disruption of blood-brain barrier (BBB). The BBB is an interface, separating the brain from the circulatory system and protecting the central nervous system from potentially harmful chemicals while regulating transport of essential molecules and maintaining a stable environment. Owing to the inability of the neurons to regenerate on their own after neurodegeneration or severe damage to the neural tiss...
Section 1 - General Critical Care Section 2 - Respiratory Critical Care Section 3 - Hepatic, Gastrointestinal & Endocrine Emergencies in ICU Section 4 - Neuro Critical Care Section 5 - Nephro Critical Care Section 6- Infections & Antibiotics Section 7- Obstetric Critical Care Section 8 - Trauma Critical Care Section 9 - Cardiac Critical Care Section 10- Poisoning Section 11- Onco Critical care
This book constitutes the refereed conference proceedings of the 20th Australasian Conference on Information Security and Privacy, ACISP 2015, held in Brisbane, QLD, Australia, in June/July 2015. The 28 revised full papers presented in this volume were carefully revised and selected from 112 submissions. The papers are organized in topical sections on symmetric cryptanalysis; public key cryptography; identity-based encryption; digital signatures; security protocols; privacy protocols; symmetric constructions; homomorphic encryption and obfuscation.
In the past decade, social media has become increasingly popular for news consumption due to its easy access, fast dissemination, and low cost. However, social media also enables the wide propagation of "fake news," i.e., news with intentionally false information. Fake news on social media can have significant negative societal effects. Therefore, fake news detection on social media has recently become an emerging research area that is attracting tremendous attention. This book, from a data mining perspective, introduces the basic concepts and characteristics of fake news across disciplines, reviews representative fake news detection methods in a principled way, and illustrates challenging i...
This book constitutes the refereed proceedings of the 16th International Conference on on Applied Cryptography and Network Security, ACNS 2018, held in Leuven, Belgium, in July 2018. The 36 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers were organized in topical sections named: Cryptographic Protocols; Side Channel Attacks and Tamper Resistance; Digital Signatures; Privacy Preserving Computation; Multi-party Computation; Symmetric Key Primitives; Symmetric Key Primitives; Symmetric Key Cryptanalysis; Public Key Encryption; Authentication and Biometrics; Cloud and Peer-to-peer Security.
This volume originates from the proceedings of the International Conference on Nano for Energy and Water (NEW) & Indo French Workshop on Water Networking, 22-24 February, 2017 in Dehar. NEW-2017 is aimed at students, educators, researchers, scientists, engineers and industrialists, engaged in a wide range of nanotechnology fields and related applications. NEW-2017 will provide an ideal environment to develop new collaborations and meet experts of thematic areas. The conference aims to exchange the technical/scientific information with the representatives of various industries and R & D Organisations, to provide technical support to government and non-government agencies across the globe in policy planning and implementation in the relevant areas, to promote and document the recent developments in nanotechnology for energy and water applications and to highlight the future need of nanotechnology in different fields.
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Information Security and Cryptology, Inscrypt 2014, held in Beijing, China, in December 2014. The 29 revised full papers presented were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections on privacy and anonymity, multiparty and outsource computation, signature and security protocols, lattice and public key cryptography, block cipher and hash function, authentication and encryption, elliptic curve, and cryptographic primitive and application.