Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Artificial Intelligence and Transforming Digital Marketing
  • Language: en
  • Pages: 1145

Artificial Intelligence and Transforming Digital Marketing

This book explores how AI is transforming digital marketing and what it means for businesses of all sizes and looks at how AI is being used to personalize content, improve targeting, and optimize campaigns. This book also examines some of the ethical considerations that come with using AI in marketing.

Fluid Flow Problems
  • Language: en
  • Pages: 84

Fluid Flow Problems

In physics and engineering, fluid dynamics is a subdiscipline of fluid mechanics that describes the flow of fluids, liquids, and gases. It has several subdisciplines, including aerodynamics (the study of air and other gases in motion) and hydrodynamics (the study of liquids in motion). Fluid dynamics has a wide range of applications, including calculating forces and moments on aircraft, determining the mass flow rate of petroleum through pipelines, predicting weather patterns, understanding nebulae in interstellar space and modeling fission weapon detonation. In this book, we provide readers with the fundamentals of fluid flow problems. Specifically, Newtonian, non-Newtonian and nanofluids are discussed. Several methods exist to investigate such flow problems. This book introduces the applications of new, exact, numerical and semianalytical methods for such problems. The book also discusses different models for the simulation of fluid flow.

Understanding and Applying Cryptography and Data Security
  • Language: en
  • Pages: 667

Understanding and Applying Cryptography and Data Security

  • Type: Book
  • -
  • Published: 2009-04-09
  • -
  • Publisher: CRC Press

A How-to Guide for Implementing Algorithms and Protocols Addressing real-world implementation issues, Understanding and Applying Cryptography and Data Security emphasizes cryptographic algorithm and protocol implementation in hardware, software, and embedded systems. Derived from the author’s teaching notes and research publications, the text is designed for electrical engineering and computer science courses. Provides the Foundation for Constructing Cryptographic Protocols The first several chapters present various types of symmetric-key cryptographic algorithms. These chapters examine basic substitution ciphers, cryptanalysis, the Data Encryption Standard (DES), and the Advanced Encrypti...

Grid Enabled Remote Instrumentation
  • Language: en
  • Pages: 583

Grid Enabled Remote Instrumentation

Grid architectures, which are viewed as tools for the integration of distributed resources, play a significant role as managers of computational resources, but also as aggregators of measurement instrumentation and pervasive large-scale data acquisition platforms. The functionality of a grid architecture allows managing, maintaining, and exploiting hetereogeneous instrumentation and acquisition devices in a unifed way by providing standardized interfaces and common work environments to their users. This result is achieved through the properties of isolation from the physical network and from the peculiarites of the instrumentation granted by standard middleware together with secure and flexibile mechanisms which seek, access, and aggregate distributed resources. This book focuses on a number of aspects related to the effective exploitation of remote instrumentation on the grid. These include middleware architecture, high speed networking in support of grid applications, wireless grid for acquisition devices and sensor networks, quality of service provisioning for real time control, and measurement instrumentation.

Imaging for Forensics and Security
  • Language: en
  • Pages: 222

Imaging for Forensics and Security

Imaging for Forensics and Security: From Theory to Practice provides a detailed analysis of new imaging and pattern recognition techniques for the understanding and deployment of biometrics and forensic techniques as practical solutions to increase security. It contains a collection of the recent advances in the technology ranging from theory, design, and implementation to performance evaluation of biometric and forensic systems. This book also contains new methods such as the multiscale approach, directional filter bank, and wavelet maxima for the development of practical solutions to biometric problems. The book introduces a new forensic system based on shoeprint imagery with advanced techniques for use in forensics applications. It also presents the concept of protecting the originality of biometric images stored in databases against intentional and unintentional attacks and fraud detection data in order to further increase the security.

Hardware Security
  • Language: en
  • Pages: 592

Hardware Security

  • Type: Book
  • -
  • Published: 2014-10-29
  • -
  • Publisher: CRC Press

Beginning with an introduction to cryptography, Hardware Security: Design, Threats, and Safeguards explains the underlying mathematical principles needed to design complex cryptographic algorithms. It then presents efficient cryptographic algorithm implementation methods, along with state-of-the-art research and strategies for the design of very large scale integrated (VLSI) circuits and symmetric cryptosystems, complete with examples of Advanced Encryption Standard (AES) ciphers, asymmetric ciphers, and elliptic curve cryptography (ECC). Gain a Comprehensive Understanding of Hardware Security—from Fundamentals to Practical Applications Since most implementations of standard cryptographic ...

Reconfigurable Computing: Architectures, Tools and Applications
  • Language: en
  • Pages: 405

Reconfigurable Computing: Architectures, Tools and Applications

  • Type: Book
  • -
  • Published: 2007-06-04
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the Third International Workshop on Applied Reconfigurable Computing, ARC 2007, held in Mangaratiba, Brazil, in March 2007. The 27 full papers and 10 short papers presented together with a late-comer contribution from ARC 2006 are organized in topical sections on architectures, mapping techniques and tools, arithmetic, and applications.

THE INDIAN LISTENER
  • Language: en
  • Pages: 86

THE INDIAN LISTENER

The Indian Listener (fortnightly programme journal of AIR in English) published by The Indian State Broadcasting Service,Bombay ,started on 22 december, 1935 and was the successor to the Indian Radio Times in english, which was published beginning in July 16 of 1927. From 22 August ,1937 onwards, it was published by All India Radio,New Delhi.In 1950,it was turned into a weekly journal. Later,The Indian listener became "Akashvani" in January 5, 1958. It was made a fortnightly again on July 1,1983. It used to serve the listener as a bradshaw of broadcasting ,and give listener the useful information in an interesting manner about programmes,who writes them,take part in them and produce them alo...

Foundations and Applications of Sensor Management
  • Language: en
  • Pages: 317

Foundations and Applications of Sensor Management

This book covers control theory signal processing and relevant applications in a unified manner. It introduces the area, takes stock of advances, and describes open problems and challenges in order to advance the field. The editors and contributors to this book are pioneers in the area of active sensing and sensor management, and represent the diverse communities that are targeted.

Sensor Networks
  • Language: en
  • Pages: 396

Sensor Networks

The idea of this book comes from the observation that sensor networks represent a topic of interest from both theoretical and practical perspectives. The title und- lines that sensor networks offer the unique opportunity of clearly linking theory with practice. In fact, owing to their typical low-cost, academic researchers have the opportunity of implementing sensor network testbeds to check the validity of their theories, algorithms, protocols, etc., in reality. Likewise, a practitioner has the opportunity of understanding what are the principles behind the sensor networks under use and, thus, how to properly tune some accessible network parameters to improve the performance. On the basis of the observations above, the book has been structured in three parts:PartIisdenotedas“Theory,”sincethetopicsofits vechaptersareapparently “detached” from real scenarios; Part II is denoted as “Theory and Practice,” since the topics of its three chapters, altough theoretical, have a clear connection with speci c practical scenarios; Part III is denoted as “Practice,” since the topics of its ve chapters are clearly related to practical applications.