You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Set in 1950s’ Madras, the story revolves around Anand and Priya, who briefly interacted when they lived in an orphanage fleetingly during their childhood. In his search for Priya, Anand comes across the Kesavans. A warm family, they are benevolence personified who take him in as their own almost immediately. The story slowly unravels as life throws up several challenges for Anand and the people in his life. Thriving on complex human feelings, psychologies, expectations and revelations, Whirpool of Life presents human existence in its ever-changing form, as one man and his long-lost love try to help and provide for those who are less fortunate than them.
The three volume set LNICST 84 - LNICST 86 constitute the refereed proceedings ofthe Second International Conference on Computer Science and InformationTechnology, CCSIT 2012, held in Bangalore, India, in January 2012. The 55 revised full papers presented in this volume were carefully reviewed andselected from numerous submissions. The papers are organized in topical sectionson advances in computer science and information technology; and ad hoc andubiquitous computing.
This book constitutes the refereed proceedings of the 6th International Conference on Computer, Communication, and Signal Processing, ICCSP 2022, held in Chennai, India, in February 2022.* The 21 full and 2 short papers presented in this volume were carefully reviewed and selected from 111 submissions. The papers are categorized into topical sub-headings: artificial intelligence and machine learning; Cyber security; and internet of things. *The conference was held as a virtual event due to the COVID-19 pandemic.
ICCNT is the main annual computer and network research conference in Chennai that presents cutting edge research work. It will act as a platform for scientists, scholars, engineers and students from universities all around the world to present ongoing research and hence foster better research relations between universities and the computer and networking industry.
And The Music Lives On is an authoritative compilation of articles focusing on the Hindi film music of the Golden Era. It emphatically highlights the exceptional composers, singers, and lyricists of that time. It provides in-depth explanations of musical concepts such as Scherzando and Doo-wop, supported by numerous examples. Additionally, it includes a diverse range of topics, from songs sung on bullock carts to a comprehensive chapter on qawwalis. Moreover, it vividly portrays the dedication of actor Balraj Sahni, who would shoot during the day and spend his nights in prison. This book is an invaluable treasure trove of information.
Based on the popular "How to Talk" feature in the alternative travel magazine "Monk", this savvy and often hilarious, region-by-region guide to the way Americans talk also provides a dead-on (and sometimes too strange) indication of how we think, how we behave, and what we hold dear. 100+ photos, drawings & maps.
Machine Vision systems combine image processing with industrial automation. One of the primary areas of application of Machine Vision in the Industry is in the area of Quality Control. Machine vision provides fast, economic and reliable inspection that improves quality as well as business productivity. Building machine vision applications is a challenging task as each application is unique, with its own requirements and desired outcome. A Guide to Machine Vision in Quality Control follows a practitioner’s approach to learning machine vision. The book provides guidance on how to build machine vision systems for quality inspections. Practical applications from the Industry have been discusse...
This book constitutes the proceedings of the 4th International Conference on Network Security and Applications held in Chennai, India, in July 2011. The 63 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers address all technical and practical aspects of security and its applications for wired and wireless networks and are organized in topical sections on network security and applications, ad hoc, sensor and ubiquitous computing, as well as peer-to-peer networks and trust management.
The three volume set LNICST 84 - LNICST 86 constitute the refereed proceedings ofthe Second International Conference on Computer Science and InformationTechnology, CCSIT 2012, held in Bangalore, India, in January 2012. The 70 revised full papers presented in this volume were carefullyreviewed and selected from numerous submissions and address all major fields ofthe Computer Science and Information Technology in theoretical, methodological,and practical or applicative aspects. The papers feature cutting-edge developmentand current research in computer science and engineering.
The three volume set LNICST 84 - LNICST 86 constitute the refereed proceedings ofthe Second International Conference on Computer Science and InformationTechnology, CCSIT 2012, held in Bangalore, India, in January 2012. The 66 revised full papers presented in this volume were carefully reviewed andselected from numerous submissions. The papers are organized in topical sectionson networks and communications; wireless and mobile networks; and network security.