|
Books > Computing & IT > General
Ex. Consultant (Statistics), College of Fisheries, Central
Agricultural University, Lembucherra Tripura West, Ex. Computer
Specialist, SAARC Agricultural Information Centre, Dhaka,
Bangladesh, Ex Pr. Head, Social Science, CIFA, ICAR, Bhubaneswar,
Ex Co-ordinator, Bioinformatics Centre, CIFA, ICAR, Bhubaneswar,
All the 42 book s constitute the following focus areas like
Biotechnology, Bioinformatics, Nanotechnology, Expert System Neural
Network, Applied Technologies, Database, Modeling, Analytics and
Business Intelligence Software, IPR & Social Issues. s on
Emerging digital technologies, Information and communication
Technology Tools, skill and technologies for 21st century
Education, Big data, Business intelligence softwares, GIS, IPR and
Knowledge/Patenting/Indigenous and Traditional Knowledge Management
(KM) challenges are also included in the book. The book is divided
into 5 broad sections covering the whole gamut of emerging
technologies in the fields: 01. Biotechnology, 02. Nanotechnology,
03. Expert System Neural Network, 04. Applied Technologies, 05.
Database, Modeling, Analytics and Business Intelligence Software,
It is expected that the book will be very much useful because with
the emergence of new technologies and application through software
tools are becoming very important in the 21st Century society.
Biotechnological tools supplement various conventional approaches
in conservation, characterization and utilization for increasing
production and productivity of agricultural and horticultural
crops. The emerging field of bioinformatics is an integrated field
arising from merging of biology and informatics. It is a
conglomeration of various new frontiers of science like genomics,
proteomics, metabolomics etc. The rich warehouse of proteome and
genome information nearly doubling every year has significant
implications and applications in various areas of science including
agriculture, horticulture, forestry and food science.
Cheminformatics is specialized to a range of problems in the field
of chemistry. Chemical pesticide reduction is possible by adopting
cheminformatics methods to identify naturally occurring chemical
compounds in crops which act against pests. Bioinformatics has
transformed the discipline of life science from a purely lab based
science to an information science as well. The ICAR has recently
launched a National Agricultural Bioinformatics Grid (NABG) to
serve as a computational facility in developing national
biodatabases and data warehouses. The present book Agriculture
Bioinformatics is a compilation of 17 information packed s authored
by working scientists in the respective discipline. In addition to
the theoretical information, practical and applied aspects to boost
productivity and quality of crops are given.
The book is aimed at providing an understanding of basic principles
and practices of Biostatistics. Attempt has been made to give a
comprehensive inside into the basic concepts of biostatistics i.e.
sound easy to read, relevant and useful to students and
practitioners of biostatistics. The book includes the design of
clinical trials and epidemiological studies collection of data,
research methods, clinical measurement and sample size,
calculations for various study designs. This makes it a handbook of
biostatistics for students and researchers for agriculture,
veterinary, life sciences, medicine, public health, biological and
social sciences.
Sudden Cardiac Death (SCD) is a sudden, unexpected death caused by
loss of heart function (sudden cardiac arrest) and Sudden Cardiac
Arrest (SCA) occurs when the electrical system to the heart
malfunctions and suddenly becomes very irregular. Death can often
be a result if not handled quick enough or effectively. New
technologies seek to help with this issue. Data processing is a
crucial step to developing prognostic models. Some of the
challenges in data processing are non-linear prediction models, a
large number of patients and numerous predictors with complicated
correlations. In traditional hypothesis-driven statistical analysis
it is difficult to overcome these challenges. Current approaches to
predict cardiovascular risk fail to identify many people who would
benefit from preventive treatment, while others receive unnecessary
intervention. So, there is an emergent need of an adaptation of AI
technologies such as Machine Learning and Deep Learning Techniques
to overcome the challenges. The Machine Learning (ML) approaches
have great potential in increasing the accuracy of cardiovascular
risk prediction and to avoid unnecessary treatment. The application
of ML techniques may have the potential to improve Heart Failure
outcomes and management, including cost savings by improving
existing diagnostic and treatment support systems. Moreover, ML
algorithms can also be applied to predict SCD. Also, Machine
Learning offers an opportunity to improve accuracy by exploiting
complex interactions between risk factors. The book addresses the
impact and power of technology driven approaches for prevention and
detection of SCA and SCD. It will provide insights on causes and
symptoms of SCA and SCD and evaluate whether AI Technologies can
improve the accuracy of cardiovascular risk prediction. It will
explore the current issues and future technology driven solutions
for SCA and SCD prevention and detection.
The book deals with various tools and applications of
bioinformatics in the fields of: o agriculture, corals, structural
bioinformatics, data-mining, text-mining; o medicinal plants,
antibiotics, protein structure prediction, drug design; o gene
expression, micro-arrays, proteomics, molecular phylogenic location
of the Indian Liver Fluke, rough sets to predict protein structural
class; o artificial neural networks for prediction of amino acids
levels, plant systems biology, molecular modeling, homology
modeling, bio-efficacy of indigenous bacillus through in-silico
approach; o fresh aquaculture and fisheries, pesticides and
insecticides, databases and tools development in the relevant area.
The book would be of much use to the person working in the field of
agricultural biotechnology, bioinformatics, computer science and
applied statistics. This can act as a book for M.Sc, M.Tech and
Ph.D students of and the faculty of
Bioinformatics/Biotechnologists.
This book explores new methods, architectures, tools, and
algorithms for Artificial Intelligence Hardware Accelerators. The
authors have structured the material to simplify readers’ journey
toward understanding the aspects of designing hardware
accelerators, complex AI algorithms, and their computational
requirements, along with the multifaceted applications. Coverage
focuses broadly on the hardware aspects of training, inference,
mobile devices, and autonomous vehicles (AVs) based AI accelerators
Using the familiar software Microsoft ® Excel, this book examines
the applications of complex variables. Implementation of the
included problems in Excel eliminates the “black box” nature of
more advanced computer software and programming languages and
therefore the reader has the chance to become more familiar with
the underlying mathematics of the complex variable problems. This
book consists of two parts. In Part I, several topics are covered
that one would expect to find in an introductory text on complex
variables. These topics include an overview of complex numbers,
functions of a complex variable, and the Cauchy integral formula.
In particular, attention is given to the study of analytic complex
variable functions. This attention is warranted because of the
property that the real and imaginary parts of an analytic complex
variable function can be used to solve the Laplace partial
differential equation (PDE). Laplace's equation is ubiquitous
throughout science and engineering as it can be used to model the
steady-state conditions of several important transport processes
including heat transfer, soil-water flow, electrostatics, and ideal
fluid flow, among others. In Part II, a specialty application of
complex variables known as the Complex Variable Boundary Element
Method (CVBEM) is examined. CVBEM is a numerical method used for
solving boundary value problems governed by Laplace's equation.
This part contains a detailed description of the CVBEM and a guide
through each step of constructing two CVBEM programs in Excel. The
writing of these programs is the culminating event of the book.
Students of complex variables and anyone with interest in a novel
method for approximating potential functions using the principles
of complex variables are the intended audience for this book. The
Microsoft Excel applications (including simple programs as well as
the CVBEM program) covered will also be of interest in the
industry, as these programs are accessible to anybody with
Microsoft Office.
Can you imagine swapping your body for a virtual version? This
technology-based look at the afterlife chronicles America's
fascination with death and reveals how digital immortality may
become a reality. The Internet has reinvented the paradigm of life
and death: social media enables a discourse with loved ones long
after their deaths, while gaming sites provide opportunities for
multiple lives and life forms. In this thought-provoking work,
author Kevin O'Neill examines America's concept of afterlife—as
imagined in cyberspace—and considers how technologies designed to
emulate immortality present serious challenges to our ideas about
human identity and to our religious beliefs about heaven and hell.
The first part of the work—covering the period between 1840 and
1860—addresses post-mortem photography, cemetery design, and
spiritualism. The second section discusses Internet afterlife,
including online memorials and cemeteries; social media legacy
pages; and sites that curate passwords, bequests, and final
requests. The work concludes with chapters on the transhumanist
movement, the philosophical and religious debates about Internet
immortality, and the study of technologies attempting to extend
life long after the human form ceases.
Even though terrorism poses an increasing threat to multinational
companies, corporate leaders can thwart attacks by learning to
navigate the complexities of foreign governments, social unrest,
and cultural dissonance. Multinational corporations are on the
front lines of terrorism and cyberattacks—two of the world's
biggest threats to global security. How can corporate leaders
mitigate their organizations' risks and develop an infrastructure
that detects and deters a security menace before it happens? This
timely reference lays out essential political context and
historical background to help executives identify contemporary
threats and understand the interconnections between threat dynamics
in an increasingly dangerous international environment. This
compelling work is organized into seven chapters. The beginning
chapters profile the specific risks for multinational companies and
detail which global—and regional—factors might propagate
violence targeted at American-based businesses. Next, two
historical case studies on terrorist assaults at Tigantourine and
Mombasa illustrate how counterterrorism can successfully thwart
potential attacks against business targets. The final part
describes industrial espionage and criminal activity and then
outlines a corporate counterterror blueprint to combat the prospect
of terrorism, providing specific recommendations for preventative
measures.
This book explores 10 unique facets of Internet health and safety,
including physical safety, information security, and the
responsible use of technology, offering takeaways from interviews
with experts in the field and suggestions for proactively improving
users' Internet safety. The Internet has become for many
people—especially students and young adults—an essential and
intrinsic part of their lives. It makes information available to be
shared worldwide, at any time; enables learning about any topic;
and allows for instantaneous communication. And it provides endless
entertainment as well. But the benefits of online access are
accompanied by serious potential risks. This book covers the key
elements of Internet health and safety, including physical safety,
information security, and the responsible use of technology. It
begins with an introductory essay that gives readers the necessary
conceptual framework, and then explains specific topics such as
cyberbullying, file sharing, online predators, Internet fraud, and
obscene and offensive content. The book also answers readers'
questions in a "Q & A" section with a subject expert and
includes a directory of resources that provides additional
information and serves as a gateway to further study.
Keep track of your online passwords in this gorgeous,
alphabetically tabbed notebook featuring a modern floral design. In
this 4 × 5.75–inch, 128-page hardcover notebook with
removable cover band, record the necessarily complex passwords and
user login names required to thwart hackers. You’ll find:
Internet password safety and naming tips A to Z tabbed pages with
space to list website, username, and five passwords for each
Dedicated pages to record software license information, with spaces
for license number, purchase date, renewal date, and monthly fee
Dedicated pages to record network settings and passwords, including
for modem, router, WAN, LAN, and wireless A notes section with
blank lined pages Just say “no” to piles of sticky notes and
scraps of paper with your passwords and logins! This internet
password logbook provides an easy way to keep track of website
addresses, usernames, and passwords in one discreet and convenient
location.
|
|