You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
YOGA is considered uniquely instrumental in the search for self realisation, and through it the realisation of God. The author, who has mastered the subtle techniques of this art, has presented it in book form, showing a variety of āsanas known for their physical and curative values, Prānāyāma with its Bandhas and Dhyāna or meditation. The āsanas in the book are divided into various sections dealing with simple standing positions, forward bends, lateral movements backward extensions of the spine, correct breathing techniques during the performance of the āsanas and also the effects of the āsanas on the body, nerves and mind. The author has included simple steps for advancing from a purely physical plane to a higher level of consciousness. Almost all the illustrations in the book are her own.
The book aims at speeding up undergraduates to attain interest in advanced concepts and methods in science and engineering.
This book constitutes the refereed proceedings of the Second International Conference on Pattern Recognition and Machine Intelligence, PReMI 2007, held in Kolkata, India in December 2007. The 82 revised papers presented were carefully reviewed and selected from 241 submissions. The papers are organized in topical sections on pattern recognition, image analysis, soft computing and applications, data mining and knowledge discovery, bioinformatics, signal and speech processing, document analysis and text mining, biometrics, and video analysis.
In recent years, a considerable amount of effort has been devoted to cyber-threat protection of computer systems which is one of the most critical cybersecurity tasks for single users and businesses since even a single attack can result in compromised data and sufficient losses. Massive losses and frequent attacks dictate the need for accurate and timely detection methods. Current static and dynamic methods do not provide efficient detection, especially when dealing with zero-day attacks. For this reason, big data analytics and machine intelligencebased techniques can be used. This book brings together researchers in the field of big data analytics and intelligent systems for cyber threat in...
This contributed volume is primarily intended for graduate and professional audiences. The book provides a basic understanding of urban air quality issues, root causes for local and urban air pollution, monitoring and modelling techniques, assessment, and control options to manage air quality at local and urban scale. The book also offers useful information on indoor air quality and smart sensors, which are gaining much importance in current times.
Understanding cybersecurity principles and practices is vital to all users of IT systems and services, and is particularly relevant in an organizational setting where the lack of security awareness and compliance amongst staff is the root cause of many incidents and breaches. If these are to be addressed, there needs to be adequate support and provision for related training and education in order to ensure that staff know what is expected of them and have the necessary skills to follow through. Cybersecurity Education for Awareness and Compliance explores frameworks and models for teaching cybersecurity literacy in order to deliver effective training and compliance to organizational staff so...
In today’s modern age of information, new technologies are quickly emerging and being deployed into the field of information technology. Cloud computing is a tool that has proven to be a versatile piece of software within IT. Unfortunately, the high usage of Cloud has raised many concerns related to privacy, security, and data protection that have prevented cloud computing solutions from becoming the prevalent alternative for mission critical systems. Up-to-date research and current techniques are needed to help solve these vulnerabilities in cloud computing. Modern Principles, Practices, and Algorithms for Cloud Security is a pivotal reference source that provides vital research on the application of privacy and security in cloud computing. While highlighting topics such as chaos theory, soft computing, and cloud forensics, this publication explores present techniques and methodologies, as well as current trends in cloud protection. This book is ideally designed for IT specialists, scientists, software developers, security analysts, computer engineers, academicians, researchers, and students seeking current research on the defense of cloud services.
Humanity is facing many global challenges. These include 1) achieving food security for a rapidly growing population, 2) slowing the progression of climate change by reducing the production and release of greenhouse gases as consequence of human activity, and 3) meeting the increasing demand for clean energy that will not harm the environment. In this regard, legumes deliver several important services to societies. Legumes provide a diverse range of food crops that are significant sources of plant-based proteins for humans globally. Grain legumes present outstanding nutritional and nutraceutical properties, while being an affordable food that contributes to achieving future global food and feed security in the context of an increasing world population.
This book contains select papers presented during the 2nd National Conference on Small Satellites, discussing the latest research and developments relating to small satellite technology. The papers cover various issues relating to design and engineering, ranging from the control, mechanical, and thermal systems to the sensors, antennas, and RF systems used. The book is of interest to scientists and engineers working on or utilizing satellite and space technologies.