Vi bøger
Levering: 1 - 2 hverdage

Bøger udgivet af MOHAMMED ABDUL SATTAR

Filter
Filter
Sorter efterSorter Populære
  • af Foram Shaileshkumar Suthar
    298,95 kr.

    The Internet revolution has changed everything. As per the data, the United State household now has 5.7 Internet-connected devices, majority are smartphone, laptops, and tablets which always comes with vulnerabilities. Thousands of devices are daily targeted by attacker over Internet. Total 92.6% accessed the Internet via mobile devices. The cyber-attacks are the exploitation of those vulnerabilities. Cyber-attacks are a set of instructions performed by unauthorized or external person to fetch and collect information of the organizations. The malware, denial of services attacks, identity-based attacks, IoT-based attacks etc. are the most famous attacks. The DDoS attack is done to disrupt normal traffic by targeting websites, networks and servers with the downpour of Internet movement on the existing infrastructure. The DDoS attack is mainly performed by botnet devices. Because of the vulnerability or the weakness of the Internet-connected device, the system is targeted by the bot and the bot makes a connection with a malicious server. The command which is given by the attacker machine is followed by the botnet which causes a DDoS attack. Thousands of botnet devices target the server at the same time which causes the system to break. Because of that legitimate user is not getting a chance to access the services.

  • af Jahirul Hussain
    362,95 kr.

    Islamic ethics (akhlaq), defined as "good character". The foundational source in the gradual codification of Islamic ethics is the Muslim understanding and interpretations of the Quran and practices of Muhammad. Its meaning has always been in context of active submission to God. The motive force in Islamic ethics is the notion that every human being is called to "command the good and forbid the evil" in all spheres of life. The Quran defines and sets the standards of social and moral values for Muslims. S.A. Nigosian, professor of religious studies at the University of Toronto, states that a lengthy passage in the Quran "represents the fullest statement of the code of behaviour every Muslim must follow." The roots of Islam are considered as authoritative sources of Fiqh, on which legal practice is based. First of all these are the Quran and Sunnah. Sunnah is understood as the traditions (Hadith), which contain the expressions, descriptions of solutions, and deeds of Muhammad and his nearest associates, regarding various problems of religion, law, morals, etc. Sunnah as well as Quran, are considered to have a divine character and, theoretically, indisputable authority.

  • af Divya B.
    310,95 kr.

    Breast cancer is the most commonly diagnosed female cancer and is the major cause of morbidity and mortality among women worldwide. Cancer statistics in developed countries such as the United States of America report that about 12% of women in their general population will develop breast cancer sometime during their lives and it represents nearly 23% of all cancers in the American women. Tumors with the absence of distant metastasis and more than 4 cm in lateral dimension or tumors of any size with direct extension to the chest wall or skin are characterized as LABC. The 5-year survival rate of LABC patients is less than 30% and the median survival is about 2-2.5 years [14]. LABC patients have increased risk of loco regional recurrence, distant metastasis, reduced quality of life and overall survival than the patients diagnosed with early stage disease and require systemic therapy for improved outcome. The standard treatment care for LABC patients is as follows: neo-adjuvant chemotherapy (NACT) followed by surgery and postoperative whole breast radiotherapy. Neo-adjuvant therapy are the treatments administrated before the surgical removal of breast tumor. It shrinks the inoperable large tumors, so that it can be removed with less extensive surgery. NACT avoids mastectomy (removal of all breast tissues from the breast) in 25% of LABC patients and also improves the overall survival after breast conservative surgery. Combining NACT with the pre-operative radiation therapy (RT) results in even higher rate of pathological complete response (pCR) and breast conservation.

  • af Kusuma Midathana
    351,95 kr.

    The process industry has an uphill task of innovating new processes and technologies in order to meet the Sustainable Development Goals of United Nation's Envision 2030. Adopting green processes and technologies would obviously help in accomplishing these goals. Thus, the focus is mainly on conservation of energy and the environment. The propionates, that are formed from small chain aliphatic alcohols are suitable as additives to high-speed diesel and motor spirit. This in turn reduces the consumption of fossil fuels. Further, polyesters are the only biodegradable polymers, because of which the polyesters are useful in many domestic, industrial and commercial applications. Therefore, the use of esters as insecticides and polyesters in the production of plastics is highly encouraged because of their biodegradable nature. The esters are also found to have wide applications in organic synthesis as intermediates and as well as finished products. As intermediates, the esters are important constituents in the manufacture of pharmaceuticals and fine organic chemicals. Many end products such as aspirin are also used as medicines. The esters as end products are useful as essential oils, fuel additives, medicines, and feed materials for a large number of industrial products.

  • af Amol Shashikant Sankpal
    277,95 kr.

    Retention time is an important phenomenon in dynamic random access memory for data storage operation. The storage capacitor is solely responsible for charge storing mechanism. The overall action is control by word line and bit line. It is also responsible for sensing, monitoring and data storing operation. Normally the availability of inexpensive leakage reduction technique is the backbone of any dynamic random access memory wherein the valuable sense information is deposited in storage capacitance in electric charge form. Since there is no option available for replenishing the electric charge on storage capacitor to prevent loss of information or data. One of the most acclaimed and accepted schemes toward effecting high retention time is by incorporating the leakage reduction technique which has becomes a part of dynamic random access memory. Semiconductor memory finds its application in almost all the electronics fields comprises data sensing, monitoring and data storing operation. In computer, tablet, cell phones, real time data acquisition system, healthcare, military and many more. In most of these applications there are requirements of data sense, preserve and processing in real time operation. In other words, this selection of memories based on the types of data stored in semiconductor memory i.e. temporary or permanent in many demanding applications. But leakage current play vital role after data storage operation in semiconductor memories. Due to leakage current there may be chances of loss of information and it affects the system performance. Hence a leakage reduction technique proves to be an excellent alternative with memory circuit for minimized the leakage current.

  • af D. K. Kishore Galla
    300,95 kr.

    Nowadays, various electronic devices such as digital cameras, smart phones, or even handheld gaming consoles help in obtaining digital photos or shoot short videos. Moreover, images and videos are becoming a part of our daily routine as they remain as a source of occasion and memory of important occurrences in life. For the Human Visual System, the perception of visual feature (i.e., images or videos) can be understood with ease and will throw people back to the happiest moments of life and make them remember someone important said by many psychologists. Usually, roads are systematic in traffic management, yet there is a difficulty in solving problems concerning visually impaired persons. Even normal people get stuck in the traffic and meet with accidents. When it comes to blind people, the issue is even more serious and everyone abuses them as if they are responsible for the accident. It is a common occurrence found on regular roads that rash drivers, despite their own mistakes, always blame others for their wrongdoing.In addition, there is an issue of hiring people with poor eyesight as vehicle drivers, which causes 81% of the accidents on roads. Although this has been happening, no tests are being conducted for drivers regularly in private travel companies. The government officials must ensure eye testing for the drivers regularly. On the other hand, around 26% of accidents involving these drivers may be due to the carelessness of the opposing parties or the vehicle drivers. Nevertheless, when it comes to pedestrians, blind people are often helped by someone to cross the roads but sometimes the blind try it on their own. There is a possibility of an accident occurring in the latter case. This problem has motivated many to think of developing any useful AI interface unit. Face-based gender Recognition (FR) is probably the most dynamic application area that is imaginative and realistic and it has several guidelines to follow at various stages in the process of achieving accuracy. Software-driven automatic Face-based gender Recognition (FR) is probably the most dynamic field in Machine Learning research, attracting numerous proposals in recent years. On a human face, looks can be seen from facial muscle groups and these are sometimes not impacted through inward feeling states.

  • af Anbarasu J
    299,95 kr.

    In this modern world, risk plays a major role in every human being and risk aversion leads to a better life. In the same way, every field has its difficulties as well as ways to overcome them. Moreover, vagueness, uncertainty, and subjectivity are the main causes that makes the risk mitigation more difficult. The cause of these risks, leads the country to suffer in an environmental, economic and social manner. These risks many a times leads the whole world into crisis in many ways. Therefore, Risk assessment is the process of discovering the dangers present in the working site. It analyzes and evaluates the risk connected with the hazard in three steps: Identification, Risk analysis, and risk evaluation. In many fields, risks are very common that lead people to danger. The Construction industry has been categorized as on the most hazardous industry globally due to its accidents and lack of safety measures & precautions. Every developing country has more urban space, increased infrastructure creates more job opportunities for the workers. Infrastructure development induces faster economic growth and mitigation of poverty. Excavating the site, construction of multi-storeyed buildings and steel erection are the most common high-risk activities. Many fatalities have been recorded during the past decades and there are no safety precautions found in the developing country. Automobile usage is growing rapidly namely autonomous surface marine, aerial drones, and automobiles. Energy consumption is the most important factor in the vehicular system that grows/affects the economy. The consumption of energy affects the environment and leads to energy crisis. The car emits carbon-based compounds and volatile gas after consuming energy. Thus, the electric vehicle came into existence and it is growing rapidly. But, the supply chain creates the risks due to huge links and systems.

  • af Mohammad Arshad
    373,95 kr.

    In the present era, emerging technologies need current-carrying electrical components that are universally good in functionality and durability with low power dissipation. The growing demand for non-volatile, faster, multifunctional memory and logic devices with small sizes inspired the scientific community worldwide. Recently, many have been inspired by spintronics, particularly the usage of micro- electromechanical systems that analyse the control of the magnetic (spin) state via electric fields and/or vice versa. Such a phenomenon utilizes the intrinsic spin of electrons instead of their electronic charge for data storage. In light of this, the next- generation electronics devices, including solid-state transformers, very sensitive dc and ac magnetic field sensors, electrically tunable microwave filters, and electromagnetic-optic actuators, need to be smaller in size with the coexistence of various order parameters, i.e., magnetization, polarization, and strain. A special class of materials that unite these ferroic orders is termed as multiferroics. Multiferroic materials are those that coexist and are connected with more than one ferroic order. The subset with ferroelectric and magnetic order is the most interesting magnetoelectrics. A single-phase multiferroic material is one that possesses two or all three of the so-called "ferroic" properties, i.e., ferromagnetism, ferroelectricity, and ferroelasticity. The term "multiferroic" was first used by Schmid. However, the coexistence of magnetism and ferroelectricity is primarily described as multiferroics in current study and literature. On the other hand, ME coupling is possible regardless of the magnetic and electric order characteristics; for instance, ME can happen in paramagnetic ferroelectrics. ME coupling may also develop between the two order factors directly or indirectly through strain. The magnetic and electric order parameters emerge in different but closely related phases in the strain-mediated indirect ME coupling. Due to its potential applications in industry, magneto-electric multiferroics have attracted increasing attention from the scientific community.

  • af Rafaut Noor
    334,95 kr.

    Education includes a wide spectrum of knowledge and info which is difficult to be defined. Whatever broadens our horizon, deepens our insight, enhances our understanding, refines our emotions, piques our curiosity, and stimulates our thought and feelings, always educates us in some way. Education draws out the innate potentialities of students as well as unfolding their natural abilities and interests before the society. The process of education starts from the birth of a person. Education includes all forms of influences, direct or indirect, formal or informal, deliberate or incidental, planned or unplanned. The academic achievement of students is correlated with the potentialities and capabilities developed as outcomes of education. Thus, educationists try to fully concentrate on the development of potentials of the students to recognize and channelize them for the benefit of the individual and society. Adolescence is the age of many twists and turns as there are multiple transitions involving education, vocation, social interactions, upcoming responsibilities and future life. A wide and deep understanding of adolescence is based on the information we receive from different perspectives including philosophy, psychology, biology, politics, sociology, sports, and multimedia industries. As this technetronic world is progressing by leaps and bounds, media has taken over the globe. Along with the various psychological factors, celebrity culture emerged as one of the most influential factors which seems to affect the self-identity and academic achievement of students especially at senior secondary level. As youngsters in this group tend to get influenced and fascinated very soon by the glamorous world, they develop their self-identity accordingly as they want to be the best among their peers. Humans have a natural tendency to recognize people, whom they admire and acquaint these people for inspiration, fantasies, romance or for gossip. These admired people are known as "Celebrities" who usually summon utmost human desires, i.e., love, romance, passion, courage, imitation, inspiration, life goals etc. Celebrities seem charming and fascinating to normal people because they look as if they are involved in a universe which is parallel to others. That is just like ours yet is light-years beyond reach and on comparison normal lives seem boring and dull. Academic achievement is the basis on which the entire educational outcome of students is determined. It is one of the major aims of education. Apart from, considering it as a criterion of moving to the next class, academic achievement is also an indicator of success and it in turn establishes the future pattern of one's living. All educators try to understand the strengths and weaknesses of students whom they teach. They even explore the factors affecting the educational outcomes of their students. These factors play an important role in understanding the relationship between students' self-identity and academic achievement.

  • af AV Satyanarayana Murty
    334,95 kr.

    In the vast blue ocean, ships of different navies operate far from each other and are generally not in visual range. However, a ship can be uniquely identified based on a number of emissions that are characteristic to each and are called signatures. These include acoustic signature from machinery and flow, heat or infrared signature from exhaust, radar cross section from hull surfaces, magnetic signature from hull material, electric signature from corrosion protection systems etc. These signatures are used by surveillance and tracking sensors for attacking ships in general and warships, in particular. Survivability at sea requires management of all platform signatures to produce a net effect of reduced vulnerability. Anti-ship missiles pose the greatest threat to ships at sea. Prior to the Second World War, studies were carried out in parallel on the use of radar and infrared seekers in missiles for detection, identification and homing. For the materials available in the 1940s, radar seekers gave better results and hence, have become the standard fit. Over the years, advances in material sciences have improved the capabilities of infrared seekers and today, missiles have several guidance/seeker options that include radar, electro- optical camera and infrared imaging. Infrared homing is preferred for terminal guidance because of its inherent immunity to jamming techniques. A stealthy naval platform remains undetected and therefore can be deployed closer to the target to fulfill its mission with lesser risk of damage and associated causalities. Signatures used for ship detection include both underwater and above water. Signatures used by underwater weapons like torpedoes and mines are acoustics, magnetics, wake homing and extremely low frequency emissions (ELFE). Anti-ship missiles use above water signatures that include laser cross section (LCS), radar cross section (RCS), air borne noise and infrared (IR).

  • af Real Sumayya Abdul Sattar
    337,95 kr.

    Breast cancer accounts for 25% of the world cancers and is the most frequent cancer among women. Less developed regions had 883,000 breast cancer cases whereas more developed regions had 794,000 breast cancer cases. It is second most prevalent cancer and ranks fifth with respect to overall cancer related mortality, with a prediction of increase in new cases upto 22 million in two decades. Long-time fertility, use of oral contraceptives, nulliparity, obesity post menopause, hormone replacement therapy, various genetical, environmental and life style factors are some of the important risk factors reported. Various signaling pathways are interconnected during breast carcinogenesis. Hippo signaling actively participates in the normal mammary gland development and is an emerging tumor suppressor pathway. Deregulation of Hippo signaling leads to mammary gland malignancy. A considerable percentage of human breast cancers may be transformed due to the deregulation of Leukemia inhibitory factor receptor (LIFR). LIFR, also known as glycoprotein-190 (gp 190), is a novel tumor suppressor and belongs to the large family of the hematopoietin receptors. A variety of hematopoietic and epithelial cells has been identified for the presence of LIFR. Leukemia inhibitory factor (LIF) is a pluripotent cytokine with heterogeneous effects on hematopoietic and epithelial cells. The effects can be growth-stimulatory or growth-inhibitory based on the nature of the target cell. Several human malignancies have shown the involvement of LIFR including medulloblastoma, nasopharyngeal carcinoma, liver, lung, and breast cancer.

  • af Veeraankalu Vuyyuru
    309,95 kr.

    Rainfall is essential to the survival of all living things. It is important not only for humans, but also for animals, plants, and all other living things. Water is probably one of the most natural resources on the planet, and it plays an important part in agriculture and farming. Changes in climatic conditions, as well as rising greenhouse gas emissions, have made it harder for humans and the planet to get the appropriate quantity of rainfall to meet human requirements and continue to utilize in daily life. As a result, it has become critical to analyze shifting rainfall patterns and attempt to forecast rain not just for human needs but also for environmental purposes to forecast natural disasters that might be caused by unexpected heavy rains.Weather forecasting is the process of predicting the future state of the atmosphere at a specific location by applying the current technology and methods, applied to the atmosphere's present state such as humidity, temperature, and wind are gathered. Meteorology is the study of the earth's atmosphere and the distinctions in moisture and temperature patterns. In the process of meteorology, the data collected over the present atmospheric conditions are used to determine the weather forecasts. The major challenges with weather forecasts lie in the atmosphere's chaotic nature, and inadequate knowledge of the process and the forecast range to be predicted. In the case of Automatic weather stations or trained observers, initially, the process starts with observing the surface of the earth's atmosphere followed by collecting information like wind speed and direction, temperature, precipitation, and humidity. Rainfall, stage a substantial character in the climate system as it directly influences other major factors such as agriculture, ecosystems, and water resource management. Often, if not properly managed, the heavy rainfall may also lead to natural disasters like floods, mudslides, landslides, and so on. Every year, the disasters caused by these heavy rainfalls are severely affecting the human-life and infrastructure. In recent times, machine learning has gained a lot of importance because of its capability in finding solutions to most conventional engineering problems. Machine learning algorithms train the computers on data and utilize statistical analysis to automatically predict output for the new input.

  • af P. Karthika
    321,95 kr.

    Endocrine systems, also referred to as hormone systems, are found in all mammals, birds, fish, and many other types of living organisms. A hormone is a chemical produced by specific cells, mostly within an endocrine gland, and released into the bloodstream to communicate with another part of the body. It is often referred to as a 'chemical messenger'. Hormones are found in all multicellular organisms and their role is to provide an internal communication system between cells located in distant parts of the body. A person with an irregular level of hormones is called as having hormonal disorder. This disorder affects growth and development, digestion, breathing, blood circulation, sexual function, metabolism, and reproduction. The human endocrine system not only responds to hormones, but also to external environmental stimuli such as chemicals, and steroidal drugs. So, monitoring endocrine disrupting chemicals is an important task to save species on water planet. Numerous compounds derived from both natural and synthetic can mimic or interfere with the hormones secreted from the human endocrine system. The Environmental Protection Agency (EPA) defines these compounds as endocrine disrupting chemicals (EDCs). Further, they were described as "an exogenous mediator". Most people are exposed to endocrine disruptors through air, water and food.

  • af Attaur Rahman Azami
    323,95 kr.

    "A nominal zero interest rate, according to Friedman, is a requirement for the best distribution of resources. By examining general equilibrium models, it was discovered that zero interest rates are both necessary and sufficient for allocative efficiency". Interest Free Banking is based on the Islamic Shariah's "Fiqhul-Muamalaat" doctrine. There are two main tenets: the first is that parties should split profits and losses; the second prohibits lenders and investors from engaging in the collection and payment of interest. The "Riba" of interest collection is expressly forbidden under Shariah. Additionally, "investments in pork, gambling, entertainment, and other banned goods are severely prohibited. In 51 nations, including the United States and the United Kingdom, there were more than 500 Islamic Banks". Thus, IFB was developed to meet customer demand for banking services that complied with Shariah regulations. Islamic thought views "Interest Free Bank as a Halaal alternative that would protect the interests of the servants from harms associated with Haraam that is prohibited by the Almighty saying (God has permitted the sale and prohibited usury)" Quran: 2:75. The fundamental justification for the ban on interest is that it is oppressive and unfair. Rich people who can lend can also charge interest on those loans, allowing them to amass wealth at the expense of those who are in need of it. The Islamic Financial System was reportedly standing on solid ground, particularly in the aftermath of the 2008 financial crisis due to the presence of financial institutions in numerous nations. Currently, the UAE, Saudi Arabia, Bahrain, Britain, Malaysia, and Singapore are vying with one another to establish themselves as the world's leading centres for IFB. The Islamic finance sector has now begun to grow outside of the major Muslim nations, transcending national boundaries and religious restrictions. This industry has experienced tremendous expansion in Europe, the "United Kingdom", "Australia", "Hong Kong", "Korea", and the "United States".

  • af Shashikumar G S
    277,95 kr.

    Critical issues in human behaviour are emotions. In daily interactions with others and in the making of decisions, emotion is significant. According to physiological concepts, emotion is a short-lived event. There is a close relation between emotion recognition and human wellness. The environment presented the constant demands, so that phenomenon of emotion represents efficient modes of adaptation. Human interaction has been categorised into two interaction channels: one transmits very clear messages, which is about anything or nothing and other one transmits embedded messages about the speakers themselves. In order to understand the channel which does not transmit clear messages, huge efforts were made towards the linguistic analysis. But the second is not as well understood. Understanding the other person's emotion is one of the key challenging tasks associated with the embedded message. Emotion can express through actions, such as words, sounds, facial expression, and body language, However, emotion expressed in such actions are sometimes manipulated by people and real feelings cannot be conveyed clearly. The emotion is referred by researchers as a mental state that is influenced by strong or deep brain impulses. This neural impulse arises subjectively but not through conscious effort. To move an organism into action, emotion induces either positive or negative psychological response. A cutting-edge area of computing called affective computing has been working to enhance human-computer interaction (HCI). Due to a lack of emotional intelligence, today's HCI systems are defective and unable to distinguish different emotional states in people. By recognizing emotional cues that emerge during HCI and evoking emotional reactions, affective computing seeks to close this gap. If computers can identify emotions, this will improve the design and development of systems that can do the same. The healthcare industry would benefit greatly from wearable technology that can distinguish different human emotions in real time and respond accordingly.

  • af Priyanka Singh Tomar
    321,95 kr.

    The current evolution of West Nile Virus (WNV) disease with increase in the frequency, number and severity of cases in many countries reveal that new epidemiological scenarios are being appeared all across the world. The first United States (US) outbreak of WNV occurred in New York City in 1999; 68 human infections, mostly as encephalitis and meningitis were reported, resulting in 7 deaths. Since 1999, WNV epidemics have re-emerged again with about 30,000 confirmed human cases and more than 1,000 deaths through 2006. Analysis have revealed that spread of a new WNV dominant genotype, named WN02, which has been rising in the US since 2002. Phylogenetic comparison of complete and partial nucleotide sequences from US isolates found between the 1999 and 2000 outbreaks with WN- NY99 isolate revealed a high level of genetic similarity. The study of 22 WNV isolates from 2001-2002 revealed genetic diversity compared with WN-NY99 genotype. More than 70 viruses are included within the genus Flavivirus which have wide global range. Some geographically important flaviviruses which causes infection in humans include JEV, Zika virus (ZIKAV), Dengue virus (DENV), Murray valley encephalitis virus (MVEV), WNV and Yellow fever virus (YFV). Utmost number of these viruses is responsible for hemorrhagic disease, encephalitis clinical expression such as capillary leakage and fever finally leading to death. According to analysis, more than half of the world population suffering from the viral infection risk by WNV, DENV, ZIKAV, JEV and YFV. WNV transmission usually occurs by the bite of an infected Culex species mosquitoes to healthy human and horses. Culex species mosquitoes have been recognized as the most important vector for transmission of WNV infection. Humans either most commonly get infected by mosquitoes acquire virus infection or mosquitoes bite while feeding on WNV infected birds. About 20% of WNV infected individuals develop symptoms after incubation period of 3-14 days. The comman symptoms of WNV are headache, fever, rashes, nausea and vomiting etc. But this situation become critical during neurological complications like encephalitis, meningitis and acute flaccid paralysis occurs in young or old age individuals

  • af Akshay K
    288,95 kr.

    Devices for generation, distribution and regulation of electric power are important parts of appliances for healthcare, comfort, defence and transportation. Two classes of such devices discussed in this thesis are diodes and MOSFETs. These are used in rectification, amplification and switching applications, and are realized in semiconductor materials. The power level at which these devices operate is decided by the application. Depending on the voltage and current rating, this can vary from 1 Giga Watt at the power station to few Watts for mobile chargers. To cater to this wide range of power levels, power converter circuits are often employed. Depending on the application, these converters could be AC-DC, DC-AC, DC-DC or AC-AC. Although the functionality of these circuits is different, all of them invariably requires power switches. The performance of these switches decides the conversion efficiency of the converter. So far, power devices fabricated in Si (silicon) have been the workhorse. It is of interest to discuss the performance of a Si switch in terms of the five characteristics listed above. Silicon switches are mostly normally off and thereby avoid complex driving circuits. Apart from this, Si switches underperform in terms of the other four characteristics. Superjunction concept was originally introduced in the context of silicon devices. Later, it has been extended to other wide bandgap materials like SiC and GaN to combine the advantage of linear VBR-RONSP relation and the large value of EC. It is to be noted that although different materials offer different technological challenges to realize a superjunction, the theory of superjunction operation and the analytical design equations are valid across materials upon making changes to the material specific parameters (e.g. impact ionization coefficients, mobility etc.). Hence, a model developed to design the optimum superjunction parameters has potentially a large impact. It can help technologists working across materials to steer their efforts more effectively towards realizing the best device for a target application with minimum cost and effort.

  • af John Thomas
    341,95 kr.

    The somatosensory system, one of the five main sensory systems in our body enables perception through touch, to help decipher the shape and texture of the objects, and know about the relative position of our body parts. It also helps avoid noxious stimuli by analysing the information about temperature and pain. The system comprises of three major ascending sensory pathways: the anterolateral or spinothalamic system (ALS), the dorsal column-medial lemniscal pathway (DCML), and the somatosensory pathways to cerebellum. These sensory pathways differ in the functional component of the mechanosensory information from the cutaneous and deep mechanoreceptors that is conveyed. The anterolateral system is further subdivided into two components, the lateral pathway that conveys pain and temperature information, and anterior tracts that convey crude touch and pressure. The DCML system carries inputs that enable sensations of fine touch, vibration, two point discrimination and proprioceptive information about joint position and movement. The spinocerebellar pathways carry proprioceptive inputs, pain and pressure information. These ascending pathways convey the tactile and other somatosensory information to multiple nuclei in the brainstem and thalamus, which further ascends to the primary sensory areas in the post central gyrus, and further to the higher order association cortices in the parietal lobe and upper bank of the lateral sulci. Sensory transduction is the conversion of mechanical stimulus energy into an electrical signal and is the first step in sensory processing. This is mediated by receptors whose location and properties decide the quality and strength of the stimulus conveyed. Based on the function, these sensory receptors can be grouped as: mechanoreceptors (touch and movement), nociceptors (pain) and thermoceptors (temperature). The functional importance of a body part in discriminative touch for a species correlates with the density of the mechanoreceptors on the skin. In primates, the digit tips have the maximum receptor density, closely followed by sensitive areas of the lips and face. In rodents, the primary sensory organs are the whiskers on the face. The information from the mechanoreceptors flows through the peripheral nerve afferents whose cell bodies lie in the dorsal root ganglia or cranial nerve ganglia to reach the spinal cord and brain stem. The afferents bifurcate into long ascending and short descending fibers upon entering the posterior funiculus of the spinal cord.

  • af Apurva S. Kittur
    320,95 kr.

    Internet of Things (IoT) is coined in 1999 by Kevin Ashton. IoT can be de¿ned in many ways. 'Internet' refers to the interconnectivity of devices to create a network, and 'Things' refers to the embedded objects or devices that can connect to the Internet. One way of de¿ning is, 'it is a network of sensors and smart devices which sense the data which is further processed and analysed in an ubiquitous network.' IoT has seen rapid development in recent years because of its 'smartness.' The various applications of IoT include Smart City, Smart Home, Smart Health, Transport and Logistic applications, Weather monitoring and Forecast etc. These applications have millions of devices generating large volumes of data. The rapid development of IoT has increased the curiosity of the attackers. The devices (nodes) in the IoT network have weak security protocols because of their limited computation ability and energy. Hence the nodes of the network are vulnerable to various kinds of attacks. The IoT network has sensors, actuators, controllers, gateway heads, sink, etc. For our reference, we have broadly classi¿ed these devices into sensor nodes and gateway nodes. Sensor nodes includes low computation end devices such as sensors, actuators etc., and gateway node includes gateway, sink, cluster head etc. The gateway nodes have better computation power as compared to sensor nodes. But the overall network is not competent to handle complex cryptographic operations. Signature is a unique way to identify a signer. The authenticity of a person/ organization/ entity is veri¿ed through its signature. A signature can be a handwritten one, or it can be a digital one. Digital signatures are used to verify the content of the received message and the signer's identity in digital communication. The exponential growth of Internet technology has led to the growth in usage of digital signatures. Every signer generates a unique signature using his/her private key. The veri¿er possesses the public key of the signer and veri¿es the signature using the same. The signature generated by the signer can be veri¿ed by everyone who has access to the public key. The concept of batch veri¿cation is introduced to reduce the veri¿cation time and complexity. Batch veri¿cation schemes verify multiple signatures together with signatures either signed by single or multiple signers.

  • af M. Chiranjeevi
    299,95 kr.

    The gap between the world's future food demand and the growth rate of agricultural production is rising. Food production must increase by 1.75% annually to meet the estimated population of 10 billion by 2050 . But agricultural productivity is falling behind the future demand because of various biotic and abiotic factors. One of the major reasons behind this is volatile weather patterns in the com- ing decades due to climate change, especially in tropical environments. Exploring new arable crop lands, excessive application of fertilizers, chemical pesticides, fungicides, and herbicides may not be a sustainable way to enhance food production. Eco-friendly technological innovations are required to meet the future food demand. An insect is considered a pest if it threatens a resource valued by humans. Paddy crops are affected by hundreds of insect pests out of which twenty are more serious yield affecting pests. In the Indian scenario Yellow stem borer (YSB), Brown plant hopper (BPH), Gall midge, Leaf Folder (LF), Green Leaf Hopper (GLH), and White Backed Plant Hopper (WBPH) are causing around 86% of yield damage to paddy. Integrated pest management (IPM) is a process of resolving agricultural, urban, and wildland insect pest problems with the least possible risk to the environment. IPM focuses on deterrence of pests or reducing their damage through a combination of techniques such as biological and structural strategies.

  • af Amit Kumar Trivedi
    311,95 kr.

    The developments in electronic circuit manufacturing technology made it feasible to have very compact yet powerful mobile devices. Society is more connected using these mobile electronic devices with fast and advanced communication technologies. In this electronically advanced society, the card or token-based person identi¿cation or authentication is no more trusted. Information of card can be stolen and a duplicate card can be made very easily, which is exactly same as the original one. PIN or password can be easily guessed knowing some information about the person that he/she shares on social network. Even the secret password or card can be shared, so they cannot provide security against repudiation. The use of idiosyncratic anatomical or behavioural characteristics, called biometric identi¿ers or attributes or properties or traits for establishing the individuality of a person for either identi¿cation or veri¿cation is called Biometric recognition or simply Biometrics. Biometric traits cannot be shared or stolen or duplicated. They are intrinsic property of an individual's physical body or behaviour and inseparable from the individual. Establishing the identity of a person both positive and negative from his/her physical body or behaviour is a very powerful tool for identity management and have immense potential. All these make biometrics a very appealing pattern recognition research problem, but it should be used carefully for the bene¿t of the society and reduce the identity fraud. A person's identity needs to be veri¿ed or established at a number of places. Like, is he or she authorised to enter some privilege facility, or for accessing privilege information or to check if the person is wanted for some crime. Sometimes, it is required to check whether a person has already availed a social service or not, or whether is he or she is eligible to avail the services. Unreliable answers of these questions may lead to some ¿nancial or non-¿nancial loss. Biometric identi¿ers provide a reliable answer to such questions as it cannot be easily forged, shared or lost as compared to traditional to- ken or knowledge based identi¿ers. Biometric recognition is more convenient, secure, and e¿cient; hence has better accountability.

  • af Praveen J
    321,95 kr.

    Additive Manufacturing refers to technologies that produce end products without any dies or tooling. This provides AM technologies with design freedom to manufacture any shapes without constraints. Compared to conventional manufacturing methodologies, AM processes combine materials layer by layer based on the CAD model. AM favours on-demand manufacturing as it does not require specific tooling, thus eliminating longer lead times. AM can achieve zero-waste manufacturing because of its weight-saving tendency compared to conventional manufacturing processes. Due to the design and manufacturing feasibility of producing functional and complex intricate structures by AM, the need to assemble multiple parts is eliminated. Also, AM technologies have proven to be sustainable manufacturing practices with the potential to reduce 525.5 metric tonnes of carbon footprint by 2025. Further, the product development cost and time to market the products are significantly reduced by 70 and 90%, respectively, compared to conventional manufacturing processes. This makes AM global market valued at 23 billion USD by 2023, along with a 22% compound growth rate. All these qualities propel AM technologies essential for Industry 4.0. In spite of the promise shown, AM technologies face several challenges. Primarily, AM is focused on producing a low volume of customized products, which makes it challenging to match the economic scales of bulk-quantity products produced by conventional manufacturing. Polymers are macromolecules fundamentally made of repeating units bonded through a covalent bond. Polymers are classified based on thermomechanical properties into thermoplastics and thermosets. AM technologies use polymers and their composites to fabricate products with enhanced biological, corrosion, mechanical, electrical, optical, and thermal properties. Smart structures which respond to external stimuli such as light, temperature, moisture, stress, electric and magnetic fields can also be produced by AM.

  • af V S Saranya
    367,95 kr.

    IoT security technologies ensure the protection of devices and networks associated with Internet of Things (IoT) ecosystem. IoT affords internet connectivity amid various inter related devices. It presents a unique identification and automates data transfer within the network. There are possibilities for severe vulnerabilities for the devices which are allowed with internet connection. Back to back COVID -19 pandemic periods are challenging for various industries related to healthcare, retail, automotive and manufacturing. However, IoT technology played a very important role in meeting the needs of business and customers. All the industries are evolved as smart because of the arrival of IoT. This integrated Artificial Intelligence technology and big data applied to tackle mass flooding of data in this 21st century. Various IoT devices and data centers are connected together to form IoT as an intelligent network. IoT devices are considered as connected devices which provide data analysis by making use of sensors. Number of sensors is massive and they rely on power consumption and connectivity. There are possibilities for security and privacy breaches in IoT ecosystem as more amount of confidential and sensitive information is shared. Most of the IoT devices are independent and works with less human intervention. Few IoT devices are built with exclusive authentication-based identification. Primary feature of IoT device is minimal energy consumption which affords data collection and sharing in remote areas. IoT utilization is increased in AI, cloud computing, big data and smart systems like smart cities, smart offices and smart homes. A typical IoT system is defined with three primary steps which are data collection, data transfer and data analysis. First step is referred as physical layer where sensors and microcontrollers are used for collecting and diffusing data. IoT network components like hub or gateway are utilized for data transfer in second step. In third step, data analysis is implemented by consisting user interface and cloud like back end system. Violation occurrences in any of these three steps will reveal sensitive information of connected IoT devices. Several vulnerable exploitations are implied towards IoT devices because of its poor encryption and authentication system.

  • af Agasthiyaraj L
    382,95 kr.

    Human health is harmed by both brief and prolonged period exposure to PM2.5 pollution. Particulate Matter (PM) is commonly divided into two groups, PM2.5 is particles with an aerodynamic diameter lower than 2.5 ¿m, and if the particles' aerodynamic diameter is between 2.5 to 10 ¿m then it is PM10. PM2.5 particles are generated by different man-made and natural sources such as vehicular emissions, industrial emissions, power generation emissions, cooking, house cleaning, forest fire, volcano eruption etc. Especially, PM2.5 particles are critically dangerous particles which is capable to interpenetrate into human lungs and bronchi; which causes respiratory diseases like cardiovascular disease, stroke, chronic bronchitis, asthma etc., to human beings. Thus one-third of the effects of PM2.5 pollution is associated with lung cancer, stroke, and chronic vascular disease. Majority of the particulate pollutants consist of organic compounds, such as carbon-derived compounds and also nitrogen and sulfur-based inorganic compounds. Some other sort of primary pollutant is bio-aerosols, which include bacteria, viruses, and fungi. Because they are easily spread by contaminated air, this significantly enhances the risk to human health. These biological pollutants will induce toxigenic, allergic, infectious, and other disorders in both chronic and acute forms. To protect humans from PM2.5 pollution filtration of the air is the best preservation. Resultantly, interest in high-proficiency air filtration technologies which could collect dangerous particles, toxic gases and biological contaminants all at the same time is growing. Also, these high-efficiency air filter media with different multi functionalities that can work in various temperature and humidity conditions for real-time applications is gathering a lot of attention in the past few years.

  • af Deepika T
    382,95 kr.

    The relentless ascent of the cloud computing paradigm has garnered focused attention in the framework of industry 4.0. Nowadays, Cloud computing services are being used by 70% of business organizations, except 10% more organizations contrived to utilize it. As a result, 4000 data centers are the estimated need over the next decade to accompany 400 million servers. In 2013, the projected energy utilization of United States data centers was 91 billion kWh of electricity, equivalent to a yearly yield of 34 huge (500-megawatt) coal-¿red power plants, sücient to provide electricity to all households in New York City for two years. Consequently, in the next few years, this is expected to escalate to approximately 140 billion kilowatts per hour; it emits almost 150 million carbon emission metrics annually. Speci¿cally, Amazon expends nearly half its administration ¿nancial plan to control and cool the server farms. Additionally, excessive power utilization increases system temperature and escalates every 10¿C tends to double the failure rate of electronic devices. The data center's power utilization will foresee (3- 13)% of worldwide electricity usage in 2030. The worldwide power utilization of the Hyper-Scale Data Centers (HSDCs) is 5%, while the Small and Medium-Scale Data Centers (SMSDCs) consumed the rest of the 95%. The U.S established nearly 5.17 million servers (40%) in SMSDCs. In recent days, the SMSDCs furnished with high computing utilities tend to in¿uence server power utilization. Therefore, this calls for identifying the monitoring and control measures to curtail power utilization and minimize the carbon footprint in SMSDCs. A cloud data center is associated with a group of connected Physical Machines (PMs) or hosts used by organizations for network processing, remote storage, and access to enormous data. The data centers are the backbone of the cloud environments. The virtualization technique plays a signi¿cant role in the data centers - facilitates sharing resources among customers through Virtual Machines (VMs). The IaaS layer uses virtualization technology to create VMs, consolidate work-loads, and facilitate the delivery of computational resources to end-users. The industry 4.0 environment encompasses the extensive growth of big data applications and the pervasive Internet of Things technology. Data centers are central to the current modern industrial business world. Therefore, almost 80 % of business organizations are contriving to transform to cloud computing technology, promising to enhance the business functionality. Extensive enhancements in the SMSDC infrastructure comprise a diverse set of connected devices that disseminate resources to the end users.

  • af Trupthi Devaiah C.
    397,95 kr.

    The chemical elements oxygen (0), sulfur (S), selenium (Se), tellurium (Te), and polonium (Po), belonging to group 16 of the periodic table, are called chalcogens. Chalcogenides are a class of chemical compounds consisting of at least one chalcogen anion and an electropositive element. When the electropositive element is a metal, it is called a 'metal chalcogenide.' Generally, the term chalcogenide is used to address sulfides, selenides, and tellurides rather than oxides and polonium compounds because of the strong non-metallic properties of oxygen and the strong metallic qualities of polonium. Due to the ability of the chalcogen to catenate and bind to numerous metal centers, various metal chalcogenides with different structures and compositions can be formed. The large and diverse family of metal chalcogenides can be classified in many ways; for instance, the chalcogen element present can be divided into sulfides, selenides, tellurides, and multi-chalcogen chalcogenides. Binary metal chalcogenides comprising a main group or transition metal and a chalcogen are widely explored for their distinctive chemical and physical properties and promising application in optoelectronics, photovoltaics, thermoelectrics, and photo-catalysis, and photodetection. Binary metal chalcogenides exist in many stoichiometries and structures.

  • af Atanu Mondal
    417,95 kr.

    The art of constructing complex molecular architectures has encouraged the generation of chemists to synthesize such molecules possessing significant biological and medicinal attributes. Inspired by the catalytic systems taking place in nature, chemists looked into imitating biocatalytic processes. This led to the birth of organocatalysis, where small organic molecules bearing minimal functionalities activate the substrate and affect the reactions. Organocatalysts are less toxic, readily available, and less sensitive towards air and moisture than metal catalysts. Helped by intuition and persistence, organocatalysis has emerged as one of the most important frontiers in organic synthetic research and has become a powerful tool in constructing complex molecular skeletons. There are essentially four types of organocatalysts; Lewis bases, Lewis acids, Brønsted bases, and Brønsted acids. Among the Lewis bases, N-heterocyclic carbenes (NHCs), amines, and phosphines are widely employed in catalysis..

  • af Sheikh Najam
    367,95 kr.

    Fibre hybridisation is a well-established methodology to enhance the failure strains of ¿bre reinforced composites. In a hybrid ¿bre composite, the matrix is reinforced by two or more types of ¿bres, with typically a large sti¿ness contrast. When exactly two types of ¿bres are used for reinforcement, the ¿bres with greater sti¿ness are conventionally called the low extension (LE) ¿bres, while those with greater compliance are called high extension (HE) ¿bres. Hybrid ¿bre composites are typically divided into three cate- gories. If layers of LE and HE ¿bres are stacked over one other, an interlayer or layer-by-layer con¿guration is obtained. If yarns of LE and HE ¿bres are co-woven to form a hybrid ¿bre composite, an intralayer or yarn-by-yarn con¿guration is obtained. Finally, if the LE and HE ¿bres are randomly mixed together, the intrayarn or ¿bre-by-¿bre con¿guration is obtained. From a manufacturing perspec- tive, it is most di¿cult to produce intrayarn composites, and easiest to produce interlayer composites. Hybridisation seeks to combine the advantages of both ¿bre types and alleviate some of the disadvantages. As an example, carbon ¿bre reinforced plastic (CFRP) composites exhibit good strength to weight ratio, but undergo brittle failure leading to low fracture toughness. On the other hand, glass ¿bre reinforced plastic (GFRP) composites exhibit ductile failure, but süer from a relatively higher density than CFRPs, resulting in a lower strength to weight ratio. By combining the carbon ¿bres and glass ¿bres at a microscopic level, intermediate properties can be achieved.

  • af Sameena Faheem
    417,95 kr.

    This book is a treasure trove of practical techniques to empower individuals with captivating communication skills. It unveils an array of strategies and tangible tools for honing interpersonal communication prowess. Within its pages, this compelling guide unleashes two transformative exercises: the art of public speaking and the dynamic realm of group discussions, both instrumental in fortifying language aptitude. These enchanting tasks immerse learners in a language-rich environment, measuring their progress through meticulous "before" and "after" assessments, yielding remarkable strides in effective communication. Drawing from illuminating interviews with seasoned experts and consummate professionals, the book underscores the pressing need for communication enhancement through insightful needs analysis. Furthermore, it presents a riveting analysis of a highly sought-after questionnaire, capturing the demands and desires of diverse respondents.

  • af Munish Subharwal
    397,95 kr.

    With the use of internet becoming indispensable not only in communication and business but specifically in e-banking and e-commerce, the user authentication is become mega important in today's technology dominant era and there is an imperative necessity for technologies have the potential to make authentication secure and foolproof.Security and privacy issues have remained a challenge for years. These become more crucial when it's about the security and privacy of data in electronic form. Personal identification (authentication) plays a vital role in modern society. It can help in achieving the security by the identification of an individual. Information technology widely uses Passwords or Personal Identification Numbers (PINs) to verify a user to a system. Recognition of a PIN does not, however, mean recognition of the person's identity. Anybody can have gained access to a PIN, a card or any other 'key' that is being used to get access to a device. This means that systems that are dependent on high access security cannot always rely on these kinds of tokens, since they cannot ensure that a user is who s/he claims to be. Biometrics could be used to gain trust to a device instead of PINs or passwords. biometrics or characteristics are tightly connected to an individual and cannot be forgotten, shared, stolen or easily hacked. These characteristics can uniquely identify a person, replacing or supplementing traditional security methods by providing two major improvements: personal biometrics cannot be easily stolen and an individual does not need to memorize passwords or codes. Since biometrics can better solve the problems of access control, fraud and theft, more and more organizations are considering biometrics a solution to their security problems.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.