You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
In a bizarre turn of events, Ishir, a taxi driver in Bangalore, lands up with a 'Data Scientist' interview at a premier firm. Ishir, obviously clueless about the role, is offered the prestigious job due to an HR goof-up. Feeling like a fish out of water, Ishir meets Aarna in the office. However, Ishir is no ordinary taxi driver, and Aarna is no ordinary girl. Together, they ride a roller-coaster of artificial intelligence and natural emotions. All that remains to be seen - Can Ishir's human learning survive in the cosmos of machine learning? Can Ishir and Aarna's journey of regression help them deal with their past, to forecast a future together?
Showcasing is the business action that investigates unfulfilled needs and needs, characterizes and gauges their extent, figures out which target market can be ideal and ideally served, settles based on proper items, valuing, advancement and appropriation projects to serve these business sectors with the point of investigating new chances and building up a market direction. Advertising assumes a significant function by fulfilling these requirements and needs through trade measures and by serving the best quality merchandise with the confirmation of serving the client in the most ideal way and cuts off at building long haul associations. The cycle ought to be very much imparted by building up the estimation of an item or administration through situating to clients.
This book introduces a variety of advanced machine learning approaches covering the areas of neural networks, fuzzy logic, and hybrid intelligent systems for the determination and diagnosis of cancer. Moreover, the tactical solutions of machine learning have proved its vast range of significance and, provided novel solutions in the medical field for the diagnosis of disease. This book also explores the distinct deep learning approaches that are capable of yielding more accurate outcomes for the diagnosis of cancer. In addition to providing an overview of the emerging machine and deep learning approaches, it also enlightens an insight on how to evaluate the efficiency and appropriateness of such techniques and analysis of cancer data used in the cancer diagnosis. Therefore, this book focuses on the recent advancements in the machine learning and deep learning approaches used in the diagnosis of different types of cancer along with their research challenges and future directions for the targeted audience including scientists, experts, Ph.D. students, postdocs, and anyone interested in the subjects discussed.
Entangled Fictions: Nonhuman Animals in an Indian World studies the ethical and affective relationships between human and nonhuman animals in Indian fictional worlds. While drawing upon existing theoretical and philosophical texts with nonhumanist underpinnings, Entangled Fictions argues that the corpus is limited epistemologically and politically when it comes to their examinations of the nonhuman in India. Deeply influenced by the political/existential expediencies of our times, the book traverses several genres, shifts from fictional to anecdotal, and transitions from autobiographical to spectra in effort to introduce readers to fictional worlds marked by human-nonhuman fluidity and trans-species contiguity that was imagined and lived much before the telos of human extinction became either a global or local concern.
This book explores the evolution of a Shia Ismaili identity in late colonial South Asia.
This book gathers selected research papers presented at the First Asian Symposium on Cellular Automata Technology (ASCAT 2022), organized online by academicians from Kolkata, India, during March 3–5, 2022. The book presents one of the most emergent areas in natural computing, cellular automaton (CA). CA is a paradigm of uniform fine-grained parallel computation which has been explored to understand complex systems by developing its model at the microscopic level. The book discusses many real-life problems in the domain of very large-scale integration (VLSI) design and test, pattern recognition and classification, cryptography, pseudo-random pattern generation, image processing, sensor networks, material science, etc., by using CA.
Beginning with an introduction to cryptography, Hardware Security: Design, Threats, and Safeguards explains the underlying mathematical principles needed to design complex cryptographic algorithms. It then presents efficient cryptographic algorithm implementation methods, along with state-of-the-art research and strategies for the design of very large scale integrated (VLSI) circuits and symmetric cryptosystems, complete with examples of Advanced Encryption Standard (AES) ciphers, asymmetric ciphers, and elliptic curve cryptography (ECC). Gain a Comprehensive Understanding of Hardware Security—from Fundamentals to Practical Applications Since most implementations of standard cryptographic ...
This book (Vol. II) presents select proceedings of the first Online International Conference on Recent Advances in Computational and Experimental Mechanics (ICRACEM 2020) and focuses on theoretical, computational and experimental aspects of solid and fluid mechanics. Various topics covered are computational modelling of extreme events; mechanical modelling of robots; mechanics and design of cellular materials; mechanics of soft materials; mechanics of thin-film and multi-layer structures; meshfree and particle based formulations in continuum mechanics; multi-scale computations in solid mechanics, and materials; multiscale mechanics of brittle and ductile materials; topology and shape optimiz...
Design for security and meet real-time requirements with this must-have book covering basic theory, hardware design and implementation of cryptographic algorithms, and side channel analysis. Presenting state-of-the-art research and strategies for the design of very large scale integrated circuits and symmetric cryptosystems, the text discusses hardware intellectual property protection, obfuscation and physically unclonable functions, Trojan threats, and algorithmic- and circuit-level countermeasures for attacks based on power, timing, fault, cache, and scan chain analysis. Gain a comprehensive understanding of hardware security from fundamentals to practical applications.